/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 1 The execve system call can grant a newly-started program privileges that 4 gaining these privileges as well, the kernel and user code must be 49 escalate its privileges by directly attacking setuid, setgid, and
|
D | seccomp_filter.txt | 70 run with CAP_SYS_ADMIN privileges in its namespace. If these are not 72 programs cannot be applied to child processes with greater privileges
|
/linux-4.4.14/Documentation/ |
D | kselftest.txt | 27 - note that some tests will require root privileges. 54 - note that some tests will require root privileges.
|
D | sysrq.txt | 39 allowed (by a user with admin privileges).
|
D | vfio.txt | 26 and requires root privileges to access things like PCI configuration
|
/linux-4.4.14/Documentation/trace/ |
D | mmiotrace.txt | 48 If not (requires root privileges): 53 Activate mmiotrace (requires root privileges): 69 Shut down mmiotrace (requires root privileges):
|
/linux-4.4.14/Documentation/ia64/ |
D | efirtc.txt | 89 Root privileges are required to be able to set the time of day. 122 Root privileges are required to be able to set the alarm.
|
/linux-4.4.14/security/keys/ |
D | Kconfig | 33 it is or by a process with administrative privileges. The active
|
/linux-4.4.14/Documentation/video4linux/ |
D | uvcvideo.txt | 132 Insufficient privileges (super user privileges are required).
|
/linux-4.4.14/Documentation/acpi/ |
D | method-customizing.txt | 71 memory and gain additional rights, if root's privileges got
|
/linux-4.4.14/Documentation/pti/ |
D | pti_intel_mid.txt | 40 privileges to successfully manipulate the ldisc drivers
|
/linux-4.4.14/Documentation/filesystems/ |
D | fuse.txt | 17 The filesystem daemon is running with the privileges of the mounting 228 A) mount owner should not be able to get elevated privileges with the 240 A) The mount owner could gain elevated privileges by either:
|
D | mandatory-locking.txt | 78 to run mandatory lock candidates with setgid privileges.
|
D | proc.txt | 1882 privileges, whether other user runs some sensitive program, whether other users
|
/linux-4.4.14/drivers/net/ethernet/emulex/benet/ |
D | be_main.c | 1651 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt() 1652 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt() 1655 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt() 1673 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt() 1674 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt() 1677 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt() 3944 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup() 3946 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup() 3948 vf_cfg->privileges | in be_vf_setup() 3952 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
|
D | be.h | 373 u32 privileges; member
|
D | be_cmds.h | 1727 u32 privileges; /* Used by BE3, SH-R */ member 2363 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
|
D | be_cmds.c | 2996 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, in be_cmd_set_fn_privileges() argument 3017 req->privileges_lancer = cpu_to_le32(privileges); in be_cmd_set_fn_privileges() 3019 req->privileges = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
|
/linux-4.4.14/Documentation/s390/ |
D | monreader.txt | 75 DCSS if your z/VM doesn't have one already, you need Class E privileges to
|
D | Debugging390.txt | 1479 If you have a guest with certain privileges you may be able to see devices
|
/linux-4.4.14/Documentation/security/ |
D | credentials.txt | 122 'group' and 'other'), each of which may be granted certain privileges 270 extra privileges, based on the annotations on the executable file.
|
/linux-4.4.14/tools/power/cpupower/po/ |
D | de.po | 224 msgid "Subcommand %s needs root privileges\n" 778 msgid "Intel's performance bias setting needs root privileges\n"
|
D | it.po | 224 msgid "Subcommand %s needs root privileges\n" 776 msgid "Intel's performance bias setting needs root privileges\n"
|
D | cs.po | 229 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
D | fr.po | 224 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
D | pt.po | 222 msgid "Subcommand %s needs root privileges\n" 778 msgid "Intel's performance bias setting needs root privileges\n"
|
/linux-4.4.14/Documentation/development-process/ |
D | 3.Early-stage | 28 misuse of the LSM framework (which is not intended to confer privileges
|
/linux-4.4.14/drivers/staging/speakup/ |
D | spkguide.txt | 158 which require root privileges. 648 Both require root privileges. 653 /etc/rc.d. Execute the following command with root privileges: 1125 root privileges. 1152 This script needs root privileges to run, so if it is not installed as 1171 Note that talkwith must always be executed with root privileges.
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 749 priviledges||privileges
|
/linux-4.4.14/Documentation/powerpc/ |
D | cxlflash.txt | 52 concept of a master context. A master typically has special privileges
|
D | hvcs.txt | 436 setup a session on your machine with the console group privileges. As
|
/linux-4.4.14/Documentation/vm/ |
D | hugetlbpage.txt | 57 privileges can dynamically allocate more or free some persistent huge pages
|
/linux-4.4.14/Documentation/ioctl/ |
D | hdio.txt | 531 privileges.
|
/linux-4.4.14/Documentation/laptops/ |
D | laptop-mode.txt | 433 echo "You do not have enough privileges to enable laptop_mode." >&2
|
/linux-4.4.14/Documentation/sysctl/ |
D | kernel.txt | 388 %pK will be replaced with 0's regardless of privileges.
|
/linux-4.4.14/drivers/staging/comedi/ |
D | Kconfig | 30 be requested by a userspace program without root privileges.
|
/linux-4.4.14/Documentation/networking/ |
D | filter.txt | 34 setup a socket, attach a filter, lock it then drop privileges and be
|
/linux-4.4.14/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 855 requires root privileges. 926 exploit the helper's root privileges.
|
/linux-4.4.14/init/ |
D | Kconfig | 270 process_vm_writev which allow a process with the correct privileges
|