Home
last modified time | relevance | path

Searched refs:privileges (Results 1 – 39 of 39) sorted by relevance

/linux-4.4.14/Documentation/prctl/
Dno_new_privs.txt1 The execve system call can grant a newly-started program privileges that
4 gaining these privileges as well, the kernel and user code must be
49 escalate its privileges by directly attacking setuid, setgid, and
Dseccomp_filter.txt70 run with CAP_SYS_ADMIN privileges in its namespace. If these are not
72 programs cannot be applied to child processes with greater privileges
/linux-4.4.14/Documentation/
Dkselftest.txt27 - note that some tests will require root privileges.
54 - note that some tests will require root privileges.
Dsysrq.txt39 allowed (by a user with admin privileges).
Dvfio.txt26 and requires root privileges to access things like PCI configuration
/linux-4.4.14/Documentation/trace/
Dmmiotrace.txt48 If not (requires root privileges):
53 Activate mmiotrace (requires root privileges):
69 Shut down mmiotrace (requires root privileges):
/linux-4.4.14/Documentation/ia64/
Defirtc.txt89 Root privileges are required to be able to set the time of day.
122 Root privileges are required to be able to set the alarm.
/linux-4.4.14/security/keys/
DKconfig33 it is or by a process with administrative privileges. The active
/linux-4.4.14/Documentation/video4linux/
Duvcvideo.txt132 Insufficient privileges (super user privileges are required).
/linux-4.4.14/Documentation/acpi/
Dmethod-customizing.txt71 memory and gain additional rights, if root's privileges got
/linux-4.4.14/Documentation/pti/
Dpti_intel_mid.txt40 privileges to successfully manipulate the ldisc drivers
/linux-4.4.14/Documentation/filesystems/
Dfuse.txt17 The filesystem daemon is running with the privileges of the mounting
228 A) mount owner should not be able to get elevated privileges with the
240 A) The mount owner could gain elevated privileges by either:
Dmandatory-locking.txt78 to run mandatory lock candidates with setgid privileges.
Dproc.txt1882 privileges, whether other user runs some sensitive program, whether other users
/linux-4.4.14/drivers/net/ethernet/emulex/benet/
Dbe_main.c1651 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt()
1652 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt()
1655 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt()
1673 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt()
1674 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt()
1677 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt()
3944 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup()
3946 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup()
3948 vf_cfg->privileges | in be_vf_setup()
3952 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
Dbe.h373 u32 privileges; member
Dbe_cmds.h1727 u32 privileges; /* Used by BE3, SH-R */ member
2363 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
Dbe_cmds.c2996 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, in be_cmd_set_fn_privileges() argument
3017 req->privileges_lancer = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
3019 req->privileges = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
/linux-4.4.14/Documentation/s390/
Dmonreader.txt75 DCSS if your z/VM doesn't have one already, you need Class E privileges to
DDebugging390.txt1479 If you have a guest with certain privileges you may be able to see devices
/linux-4.4.14/Documentation/security/
Dcredentials.txt122 'group' and 'other'), each of which may be granted certain privileges
270 extra privileges, based on the annotations on the executable file.
/linux-4.4.14/tools/power/cpupower/po/
Dde.po224 msgid "Subcommand %s needs root privileges\n"
778 msgid "Intel's performance bias setting needs root privileges\n"
Dit.po224 msgid "Subcommand %s needs root privileges\n"
776 msgid "Intel's performance bias setting needs root privileges\n"
Dcs.po229 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dfr.po224 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dpt.po222 msgid "Subcommand %s needs root privileges\n"
778 msgid "Intel's performance bias setting needs root privileges\n"
/linux-4.4.14/Documentation/development-process/
D3.Early-stage28 misuse of the LSM framework (which is not intended to confer privileges
/linux-4.4.14/drivers/staging/speakup/
Dspkguide.txt158 which require root privileges.
648 Both require root privileges.
653 /etc/rc.d. Execute the following command with root privileges:
1125 root privileges.
1152 This script needs root privileges to run, so if it is not installed as
1171 Note that talkwith must always be executed with root privileges.
/linux-4.4.14/scripts/
Dspelling.txt749 priviledges||privileges
/linux-4.4.14/Documentation/powerpc/
Dcxlflash.txt52 concept of a master context. A master typically has special privileges
Dhvcs.txt436 setup a session on your machine with the console group privileges. As
/linux-4.4.14/Documentation/vm/
Dhugetlbpage.txt57 privileges can dynamically allocate more or free some persistent huge pages
/linux-4.4.14/Documentation/ioctl/
Dhdio.txt531 privileges.
/linux-4.4.14/Documentation/laptops/
Dlaptop-mode.txt433 echo "You do not have enough privileges to enable laptop_mode." >&2
/linux-4.4.14/Documentation/sysctl/
Dkernel.txt388 %pK will be replaced with 0's regardless of privileges.
/linux-4.4.14/drivers/staging/comedi/
DKconfig30 be requested by a userspace program without root privileges.
/linux-4.4.14/Documentation/networking/
Dfilter.txt34 setup a socket, attach a filter, lock it then drop privileges and be
/linux-4.4.14/Documentation/virtual/uml/
DUserModeLinux-HOWTO.txt855 requires root privileges.
926 exploit the helper's root privileges.
/linux-4.4.14/init/
DKconfig270 process_vm_writev which allow a process with the correct privileges