Home
last modified time | relevance | path

Searched full:privilege (Results 1 – 25 of 390) sorted by relevance

12345678910>>...16

/freebsd/share/man/man9/
H A Dpriv.934 .Nd kernel privilege checking API
51 privilege checking interface.
55 The caller identifies the desired privilege via the
58 .Ss Privilege Policies
60 the superuser policy, which grants privilege based on the effective (or
69 When adding a new privilege check to a code path, first check the complete
72 to see if one already exists for the class of privilege required.
73 Only if there is not an exact match should a new privilege be added to the
74 privilege list.
75 As privilege numbers becomes encoded in the kernel module ABI, privilege
[all …]
H A Dvaccess_acl_nfs4.966 privilege was required for successful evaluation of the call; the
71 privilege information, or it may point to an integer that will be set to
72 1 if privilege is used, and 0 otherwise.
100 then super-user privilege, if available for the credential, will also be
H A Dvaccess_acl_posix1e.966 privilege was required for successful evaluation of the call; the
71 privilege information, or it may point to an integer that will be set to
72 1 if privilege is used, and 0 otherwise.
99 then super-user privilege, if available for the credential, will also be
/freebsd/crypto/krb5/src/tests/
H A Dt_kadmin_acl.py90 msg = "Operation requires ``change-password'' privilege"
108 expected_msg="Operation requires ``add'' privilege")
123 expected_msg="Operation requires ``add'' privilege")
125 expected_msg="Operation requires ``add'' privilege")
134 expected_msg="Operation requires ``delete'' privilege")
136 expected_msg="Operation requires ``delete'' privilege")
142 expected_msg="Operation requires ``get'' privilege")
155 expected_msg="Operation requires ``get'' privilege")
157 expected_msg="Operation requires ``get'' privilege")
166 expected_msg="Operation requires ``list'' privilege")
[all …]
/freebsd/sys/contrib/device-tree/Bindings/powerpc/
H A Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/freebsd/crypto/krb5/src/lib/kadm5/
H A Dkadm_err.et8 error_code KADM5_AUTH_GET, "Operation requires ``get'' privilege"
9 error_code KADM5_AUTH_ADD, "Operation requires ``add'' privilege"
10 error_code KADM5_AUTH_MODIFY, "Operation requires ``modify'' privilege"
11 error_code KADM5_AUTH_DELETE, "Operation requires ``delete'' privilege"
51 error_code KADM5_AUTH_LIST, "Operation requires ``list'' privilege"
52 error_code KADM5_AUTH_CHANGEPW, "Operation requires ``change-password'' privilege"
57 error_code KADM5_AUTH_SETKEY, "Operation requires ``set-key'' privilege"
67 error_code KADM5_AUTH_EXTRACT, "Operation requires ``extract-keys'' privilege"
/freebsd/sys/kern/
H A Dkern_priv.c51 * it is nonzero, an effective uid of 0 connotes special privilege,
53 * uid 0 is offered no special privilege in the kernel security policy.
83 &sysctl_kern_suser_enabled, "I", "Processes with uid 0 have privilege");
119 * privilege. in priv_check_cred_post()
130 * with a privilege error here. in priv_check_cred_post()
144 * Check a credential for privilege. Lots of good reasons to deny privilege;
152 KASSERT(PRIV_VALID(priv), ("priv_check_cred: invalid privilege %d", in priv_check_cred()
164 * privilege unilaterally. in priv_check_cred()
203 * Having determined if privilege is restricted by various policies, in priv_check_cred()
204 * now determine if privilege is granted. At this point, any policy in priv_check_cred()
[all …]
/freebsd/sys/sys/
H A Dpriv.h33 * Privilege checking interface for BSD kernel.
39 * Privilege list, sorted loosely by kernel subsystem.
42 * there existing instances referring to the same privilege? Third party
44 * modules. Particular numeric privilege assignments are part of the
48 * When adding a new privilege, remember to determine if it's appropriate
49 * for use in jail, and update the privilege switch in prison_priv_check()
54 * Track beginning of privilege list.
60 * number of specific privilege checks, and have (relatively) precise
77 #define PRIV_DRIVER 14 /* Low-level driver privilege. */
154 #define PRIV_MAC_PARTITION 140 /* Privilege in mac_partition policy. */
[all …]
/freebsd/sys/security/mac/
H A Dmac_priv.c52 * The MAC Framework interacts with kernel privilege checks in two ways: it
53 * may restrict the granting of privilege to a subject, and it may grant
55 * or both of these entry points. Restriction of privilege by any policy
56 * always overrides granting of privilege by any policy or other privilege
64 * Restrict access to a privilege for a credential. Return failure if any
81 * Grant access to a privilege for a credential. Return success if any
/freebsd/crypto/heimdal/lib/kadm5/
H A Dkadm5_err.et12 error_code AUTH_GET, "Operation requires `get' privilege"
13 error_code AUTH_ADD, "Operation requires `add' privilege"
14 error_code AUTH_MODIFY, "Operation requires `modify' privilege"
15 error_code AUTH_DELETE, "Operation requires `delete' privilege"
55 error_code AUTH_LIST, "Operation requires `list' privilege"
56 error_code AUTH_CHANGEPW, "Operation requires `change-password' privilege"
/freebsd/crypto/openssh/
H A DREADME.privsep1 Privilege separation, or privsep, is method in OpenSSH by which
2 operations that require root privilege are performed by a separate
3 privileged monitor process. Its purpose is to prevent privilege
8 Privilege separation is now mandatory. During the pre-authentication
28 --with-privsep-path=xxx Path for privilege separation chroot
29 --with-privsep-user=user Specify non-privileged user for privilege separation
/freebsd/crypto/krb5/src/util/support/
H A Dsecure_getenv.c37 * privilege compared to the calling process.
41 * setgid process which is still running with elevated privilege; if we can
43 * dropped privilege with seteuid() or setegid(). These comparisons do not
45 * privilege before the library initializer ran; this is not ideal because such
56 * is run by root and drops privilege, such as Apache httpd. We do not want to
59 * On some platforms a process may have elevated privilege via mechanisms other
/freebsd/sys/dev/sfxge/common/
H A Def10_mcdi.c290 * Use privilege mask state at MCDI attach. in ef10_mcdi_feature_supported()
296 * Admin privilege must be used prior to introduction of in ef10_mcdi_feature_supported()
304 * Admin privilege used prior to introduction of in ef10_mcdi_feature_supported()
313 * Admin privilege must be used prior to introduction of in ef10_mcdi_feature_supported()
314 * mac spoofing privilege (at v4.6), which is used up to in ef10_mcdi_feature_supported()
315 * introduction of change mac spoofing privilege (at v4.7) in ef10_mcdi_feature_supported()
324 * Admin privilege must be used prior to introduction of in ef10_mcdi_feature_supported()
325 * mac spoofing privilege (at v4.6), which is used up to in ef10_mcdi_feature_supported()
326 * introduction of mac spoofing TX privilege (at v4.7) in ef10_mcdi_feature_supported()
/freebsd/sys/contrib/device-tree/src/powerpc/
H A Dmicrowatt.dts44 usable-privilege = <2>;
49 usable-privilege = <3>;
55 usable-privilege = <2>;
60 usable-privilege = <3>;
65 usable-privilege = <2>;
71 usable-privilege = <3>;
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man273 This command requires the \fBadd\fP privilege.
483 This command requires the \fImodify\fP privilege.
519 This command requires the \fBdelete\fP privilege.
532 This command requires the \fBchangepw\fP privilege, or that the
587 This command requires the \fBmodify\fP privilege.
598 This command requires the \fBinquire\fP privilege, or that the principal
650 This command requires the \fBlist\fP privilege.
679 This command requires the \fBinquire\fP privilege.
729 This command requires the \fBmodify\fP privilege.
754 This command requires the \fBdelete\fP privilege.
[all …]
/freebsd/sys/cddl/dev/dtrace/
H A Ddtrace_cddl.h154 * Test privilege. Audit success or failure, allow privilege debugging.
161 * Test privilege. Audit success only, no privilege debugging.
168 * Test privilege. No priv_debugging, no auditing.
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/
H A Driscv,imsics.yaml18 for each privilege level (machine or supervisor). The configuration of
22 which is same for given privilege level across CPUs (or HARTs).
25 for each privilege level (machine or supervisor) which collectively describe
26 IMSIC interrupt files at that privilege level across CPUs (or HARTs).
33 privilege level (machine or supervisor) encodes group index, HART index,
/freebsd/crypto/krb5/doc/html/_sources/admin/admin_commands/
H A Dkadmin_local.rst.txt246 This command requires the **add** privilege.
437 This command requires the *modify* privilege.
473 This command requires the **delete** privilege.
487 This command requires the **changepw** privilege, or that the
533 This command requires the **modify** privilege.
545 This command requires the **inquire** privilege, or that the principal
590 This command requires the **list** privilege.
612 This command requires the **inquire** privilege.
661 This command requires the **modify** privilege.
679 This command requires the **delete** privilege.
[all …]
/freebsd/crypto/krb5/doc/admin/admin_commands/
H A Dkadmin_local.rst246 This command requires the **add** privilege.
437 This command requires the *modify* privilege.
473 This command requires the **delete** privilege.
487 This command requires the **changepw** privilege, or that the
533 This command requires the **modify** privilege.
545 This command requires the **inquire** privilege, or that the principal
590 This command requires the **list** privilege.
612 This command requires the **inquire** privilege.
661 This command requires the **modify** privilege.
679 This command requires the **delete** privilege.
[all …]
/freebsd/tests/sys/cddl/zfs/tests/acl/cifs/
H A Dcifs_attr_001_pos.ksh38 # PRIV_FILE_OWNER privilege could set/clear DOS attributes.
45 # PRIV_FILE_OWNER privilege
207 # PRIV_FILE_OWNER privilege, it should log_must,
220 "write_attributes permission or PRIV_FILE_OWNER privilege"
257 "write_attributes permission or PRIV_FILE_OWNER privilege"
/freebsd/crypto/krb5/doc/html/appdev/refs/api/
H A Dkrb5_pac_init.html9 …<title>krb5_pac_init - Create an empty Privilege Attribute Certificate (PAC) handle. &#8212; MIT K…
42 …b5-bugs@mit.edu?subject=Documentation__krb5_pac_init - Create an empty Privilege Attribute Certif…
55 <section id="krb5-pac-init-create-an-empty-privilege-attribute-certificate-pac-handle">
56 … - Create an empty Privilege Attribute Certificate (PAC) handle.<a class="headerlink" href="#krb5…
88 <li><a class="reference internal" href="#">krb5_pac_init - Create an empty Privilege Attribute Cer…
152 …b5-bugs@mit.edu?subject=Documentation__krb5_pac_init - Create an empty Privilege Attribute Certif…
/freebsd/tools/regression/priv/
H A Dpriv_sched_rtprio.c32 * Test privilege associated with real time process settings. There are
33 * three relevant notions of privilege:
35 * - Privilege to set the real-time priority of the current process.
36 * - Privilege to set the real-time priority of another process.
37 * - Privilege to set the idle priority of another process.
38 * - No privilege to set the idle priority of the current process.
H A Dpriv_vfs_chown.c32 * Confirm that privilege is required in the cases using chown():
56 * Check that changing the uid of a file requires privilege.
86 * privilege as long as the gid matches the process.
120 * without privilege if the gid doesn't match the process.
H A Dpriv_proc_setrlimit.c33 * requires privilege. We test three cases:
81 * privilege.
108 * without privilege.
136 * privilege.
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_priv.sgml15 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
31 <para><command>wpa_priv</command> is a privilege separation helper that
38 can be run as non-root user. Privilege separation restricts the effects
58 <command>wpa_supplicant</command> with privilege separation:</para>

12345678910>>...16