/linux-4.1.27/include/uapi/linux/ |
H A D | prctl.h | 161 * If no_new_privs is set, then operations that grant new privileges (i.e. 165 * Operations that merely manipulate or drop existing privileges (setresuid, 166 * capset, etc.) will still work. Drop those privileges if you want them gone.
|
H A D | securebits.h | 12 /* When set UID 0 has no special privileges. When unset, we support
|
H A D | acct.h | 105 #define ASU 0x02 /* ... used super-user privileges */
|
/linux-4.1.27/tools/power/cpupower/utils/ |
H A D | cpupower-info.c | 74 printf(_("Intel's performance bias setting needs root privileges\n")); cmd_info()
|
H A D | cpupower.c | 219 "privileges\n"), cmd); main()
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | ioport.c | 109 /* Trying to gain more privileges? */ SYSCALL_DEFINE1()
|
/linux-4.1.27/include/rdma/ |
H A D | ib.h | 93 * calls from various contexts with elevated privileges. That includes the
|
/linux-4.1.27/arch/score/kernel/ |
H A D | process.c | 51 /* New thread loses kernel privileges. */ start_thread()
|
/linux-4.1.27/arch/avr32/mm/ |
H A D | cache.c | 20 * privileges. The value is completely arbitrary.
|
/linux-4.1.27/drivers/misc/vmw_vmci/ |
H A D | vmci_datagram.c | 184 /* Get hold of privileges of sending endpoint. */ dg_dispatch_as_host() 188 pr_warn("Couldn't get privileges (handle=0x%x:0x%x)\n", dg_dispatch_as_host()
|
H A D | vmci_doorbell.c | 89 * privileges are determined by the context ID, but for host 90 * endpoints privileges are associated with the complete
|
H A D | vmci_context.c | 1032 * set of privilege flags that will override the privileges of
|
/linux-4.1.27/security/integrity/evm/ |
H A D | evm_main.c | 332 * requires CAP_SYS_ADMIN privileges. 354 * Removing 'security.evm' requires CAP_SYS_ADMIN privileges and that
|
/linux-4.1.27/arch/x86/include/uapi/asm/ |
H A D | hyperv.h | 23 * to the partition based upon the current partition privileges.
|
/linux-4.1.27/fs/squashfs/ |
H A D | xattr.c | 91 /* no handler or insuffficient privileges, so skip */ squashfs_listxattr()
|
/linux-4.1.27/net/atm/ |
H A D | ioctl.c | 114 * have the same privileges that /proc/kcore needs do_vcc_ioctl()
|
/linux-4.1.27/scripts/package/ |
H A D | Makefile | 82 echo "root privileges (e.g., 'fakeroot -u' or 'sudo')."; \
|
/linux-4.1.27/include/linux/ |
H A D | amd-iommu.h | 145 super-user privileges */
|
H A D | capability.h | 58 * The fs mask is all the privileges that fsuid==0 historically meant.
|
H A D | vmw_vmci_defs.h | 308 * VMCI coarse-grained privileges (per context or host
|
H A D | sched.h | 1972 #define PF_SUPERPRIV 0x00000100 /* used super-user privileges */ 2042 #define PFA_NO_NEW_PRIVS 0 /* May not gain new privileges. */
|
/linux-4.1.27/include/xen/interface/ |
H A D | grant_table.h | 106 /* The domain being granted foreign privileges. [GST] */ 117 * GTF_invalid: This grant entry grants no privileges.
|
H A D | xen.h | 552 * privileges can bind an event-channel port to a physical interrupt
|
/linux-4.1.27/drivers/media/usb/uvc/ |
H A D | uvc_v4l2.c | 432 * a given time. Trying to perform an operation that requires privileges will 433 * automatically acquire the required privileges if possible, or return -EBUSY 437 * Operations that require privileges are:
|
/linux-4.1.27/drivers/net/ethernet/emulex/benet/ |
H A D | be_main.c | 1493 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { be_set_vf_tvt() 1494 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & be_set_vf_tvt() 1497 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; be_set_vf_tvt() 1515 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { be_clear_vf_tvt() 1516 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | be_clear_vf_tvt() 1519 vf_cfg->privileges |= BE_PRIV_FILTMGMT; be_clear_vf_tvt() 3642 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, for_all_vfs() 3644 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { for_all_vfs() 3646 vf_cfg->privileges | for_all_vfs() 3650 vf_cfg->privileges |= BE_PRIV_FILTMGMT; for_all_vfs()
|
H A D | be_cmds.c | 2915 /* In UMC mode FW does not return right privileges. be_cmd_get_fn_privileges() 2929 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, be_cmd_set_fn_privileges() argument 2950 req->privileges_lancer = cpu_to_le32(privileges); be_cmd_set_fn_privileges() 2952 req->privileges = cpu_to_le32(privileges); be_cmd_set_fn_privileges()
|
H A D | be.h | 368 u32 privileges; member in struct:be_vf_cfg
|
H A D | be_cmds.h | 1698 u32 privileges; /* Used by BE3, SH-R */ member in struct:be_cmd_req_set_fn_privileges 2325 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
|
/linux-4.1.27/arch/mips/kernel/ |
H A D | process.c | 64 /* New thread loses kernel privileges. */ start_thread()
|
/linux-4.1.27/net/core/ |
H A D | dev_ioctl.c | 355 * privileges this function loads the module. If module loading is not
|
/linux-4.1.27/security/ |
H A D | commoncap.c | 293 * cap_inode_need_killpriv - Determine if inode change affects privileges 690 * of its privilege. The call to setuid(!=0) would drop all privileges!
|
H A D | device_cgroup.c | 394 * This is used to make sure a child cgroup won't have more privileges
|
/linux-4.1.27/kernel/ |
H A D | sys.c | 318 * privileges, which is often a useful assertion to make when you are doing 455 * privileges, which is often a useful assertion to make when you are doing 530 * will allow a root program to temporarily drop privileges and be able to
|
/linux-4.1.27/fs/nfsd/ |
H A D | nfsfh.c | 202 /* Elevate privileges so that the lack of 'r' or 'x' nfsd_set_fh_dentry()
|
/linux-4.1.27/arch/ia64/include/asm/ |
H A D | processor.h | 325 * uid/privileges. \
|
/linux-4.1.27/fs/ |
H A D | coredump.c | 675 * coredumps may be placed using root privileges, do_coredump()
|
/linux-4.1.27/arch/parisc/kernel/ |
H A D | entry.S | 535 /* PAGE_USER indicates the page can be read with user privileges, 1368 write/read privileges to this address.
|
/linux-4.1.27/drivers/gpu/drm/i915/ |
H A D | i915_cmd_parser.c | 50 * granting userspace undue privileges. There are three categories of privilege.
|
/linux-4.1.27/fs/jfs/ |
H A D | namei.c | 782 * does not have appropriate privileges or the implementation prohibits
|
/linux-4.1.27/net/vmw_vsock/ |
H A D | af_vsock.c | 513 * has necessary privileges. __vsock_bind_stream()
|
/linux-4.1.27/include/net/ |
H A D | tcp.h | 802 /* Algorithm can be set on socket without CAP_NET_ADMIN privileges */
|
/linux-4.1.27/lib/ |
H A D | vsprintf.c | 1566 * %pK and then elevates privileges before reading it. pointer()
|
/linux-4.1.27/mm/ |
H A D | migrate.c | 1488 * capabilities, superuser privileges or the same SYSCALL_DEFINE6()
|
H A D | nommu.c | 1914 * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise.
|
H A D | mempolicy.c | 1384 * capabilities, superuser privileges or the same SYSCALL_DEFINE4()
|
H A D | mmap.c | 148 * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise.
|
/linux-4.1.27/drivers/tty/ |
H A D | tty_io.c | 2154 * obtain the privileges associated with having a tty as tty_open() 2159 * binaries, which should not imply full privileges on all ttys. tty_open()
|
/linux-4.1.27/tools/lguest/ |
H A D | lguest.c | 3376 /* If requested, drop privileges */ main() 3393 verbose("Dropping privileges completed\n"); main()
|
/linux-4.1.27/net/xfrm/ |
H A D | xfrm_user.c | 2438 /* All operations require privileges, even GET */ xfrm_user_rcv_msg()
|
/linux-4.1.27/arch/x86/kvm/ |
H A D | emulate.c | 2866 * Check privileges. The three cases are task switch caused by... emulator_do_task_switch()
|
/linux-4.1.27/arch/tile/include/hv/ |
H A D | hypervisor.h | 768 * @param flags Context flags, denoting attributes or privileges of the
|