Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 329) sorted by relevance

12345678910>>...14

/freebsd/crypto/openssh/
H A Duidswap.c50 static int privileged = 0; variable
72 privileged = 0; in temporarily_use_uid()
78 privileged = 0; in temporarily_use_uid()
83 privileged = 1; in temporarily_use_uid()
123 /* Propagate the privileged gid to all of our gids. */ in temporarily_use_uid()
126 /* Propagate the privileged uid to all of our uids. */ in temporarily_use_uid()
139 * Restores to the original (privileged) uid.
144 /* it's a no-op unless privileged */ in restore_uid()
145 if (!privileged) { in restore_uid()
154 /* Set the effective uid back to the saved privileged uid. */ in restore_uid()
[all …]
H A Dgss-serv.c96 /* Privileged (called from ssh_gssapi_server_ctx) */
132 /* Privileged */
174 /* Privileged */
274 /* Privileged (called from accept_secure_ctx) */
357 /* Privileged */
385 /* Privileged */
395 /* Privileged */
H A DREADME.privsep3 privileged monitor process. Its purpose is to prevent privilege
29 --with-privsep-user=user Specify non-privileged user for privilege separation
50 process 6917 is the privileged monitor process, 6919 is the user owned
/freebsd/sys/dev/mthca/
H A Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Dzfs_allow_012_neg.ksh36 # Scan all permissions one by one to verify privileged user
41 # 2. Verify privileged user can not use permissions properly when
53 log_assert "Verify privileged user can not use permissions properly when " \
92 log_pass "Verify privileged user can not use permissions properly when " \
H A Dzfs_allow_010_pos.ksh36 # Scan the following permissions one by one to verify privileged user
41 # 2. Verify privileged user has correct permission without any other
47 log_assert "Verify privileged user has correct permissions once which was "\
193 log_pass "Verify privileged user has correct permissions " \
/freebsd/tests/sys/cddl/zfs/tests/delegate/
H A Dzfs_allow_012_neg.ksh36 # Scan all permissions one by one to verify privileged user
41 # 2. Verify privileged user can not use permissions properly when
54 log_assert "Verify privileged user can not use permissions properly when " \
79 log_pass "Verify privileged user can not use permissions properly when " \
H A Dzfs_allow_010_pos.ksh36 # Scan the following permissions one by one to verify privileged user
41 # 2. Verify privileged user has correct permission without any other
56 log_assert "Verify privileged user has correct permissions once which was "\
118 log_pass "Verify privileged user has correct permissions " \
/freebsd/share/man/man4/
H A Dmac_priority.466 realtime policy active, privileged users may use the
69 Privileged applications can promote threads and processes to realtime
74 When the idletime policy is active, privileged users may use the
77 Privileged applications can demote threads and processes to idle
/freebsd/crypto/openssh/contrib/cygwin/
H A DREADME30 --user -u <account> privileged user for service, default 'cyg_server'.
31 --pwd -w <passwd> Use "pwd" as password for privileged user.
32 --privileged On Windows XP, require privileged user
H A Dssh-host-config153 csih_error_recoverable "under a privileged account successfully."
154 csih_error_recoverable "Make sure to create a non-privileged user 'sshd'"
399 # Enforce using privileged user on 64 bit Vista or W7 under WOW64
406 csih_inform "user account. You need to have or to create a privileged"
421 csih_error_recoverable "There was a serious problem creating a privileged user."
442 # $password is empty, or $run_service_as is some privileged user and
571 --privileged )
587 echo " --user -u <account> privileged user for service, default 'cyg_server'."
588 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user."
589 echo " --privileged On Windows XP, require privileged user"
/freebsd/lib/libc/rpc/
H A Dbindresvport.39 .Nd bind a socket to a privileged IP port
25 are used to bind a socket descriptor to a privileged
60 Only root can bind to a privileged port; this call will fail for any
/freebsd/usr.sbin/jail/
H A Djail.8553 network subsystems, extra caution should be used where privileged access
556 Normally, privileged users inside a jail are treated as unprivileged by
558 When this parameter is set, such users are treated as privileged, and
562 privileged users inside the jail will be able to mount and unmount file
572 privileged users inside the jail will be able to mount and unmount the
663 Allow privileged process in the jail to manipulate filesystem extended
666 Allow privileged process in the jail to slowly adjusting global operating system
671 Allow privileged process in the jail to set global operating system data
695 privileged users inside the jail will be able to mount and unmount the
703 privileged users inside the jail will be able to mount and unmount
[all …]
/freebsd/share/doc/papers/jail/
H A Dpaper.ms161 these privileged operations can be used to manage system hardware and
204 and users is very difficult. Many privileged operations in UNIX seem
238 multiple users and a privileged root user in each jail, while
252 privileged process calls the jail(2) syscall, with a description of the jail as an
268 system resources and perform privileged operations is sharply curtailed, and
289 associated with privileged calls are wholesale disabled due to the nature of the
295 root privileges will find that many restrictions apply to the privileged calls
345 Other privileged activities are permitted as long as they are limited to the
382 between processes, and to files, network resources, and privileged
/freebsd/usr.sbin/rpcbind/
H A Drpcbind.8144 to use non-privileged ports for outgoing connections, preventing non-privileged
147 to connect to services from a privileged port.
/freebsd/sys/contrib/xen/
H A Dpmu.h115 * Physical processor on which the interrupt occurred. On non-privileged
121 * Domain that was interrupted. On non-privileged guests set to DOMID_SELF.
122 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
/freebsd/usr.sbin/rpc.yppasswdd/
H A Drpc.yppasswdd.8296 received from non-privileged ports are rejected.
298 behavior prevents any client systems that to not use privileged
305 disables the privileged port check so that it will work with
307 clients that do not use privileged ports.
/freebsd/lib/libsys/
H A Dsetresuid.251 Privileged processes may set these IDs
70 The calling process was not privileged
/freebsd/tools/regression/security/proc_to_proc/
H A Dscenario.c70 /* 0 */ { 0, 0, 0, 0 }, /* privileged */
71 /* 1 */ { 0, 0, 0, 1 }, /* privileged + issetugid */
91 /* privileged on privileged */
96 /* privileged on unprivileged */
101 /* unprivileged on privileged */
/freebsd/contrib/ntp/libntp/lib/isc/include/isc/
H A Dtask.h628 * Set or unset the task's "privileged" flag depending on the value of
632 * but when the task manager has been set to privileged exeuction mode via
634 * and all other tasks will wait until they're done. Once all privileged
714 * In privileged execution mode, only tasks that have had the "privilege"
717 * and proceeds with running non-privileged ready tasks. This means it is
718 * necessary to have at least one privileged task waiting on the ready
719 * queue *before* setting the manager into privileged execution mode,
/freebsd/contrib/blocklist/bin/
H A Dblacklistd.895 It is also less meaningful when it comes to connections using non-privileged
98 a UDP privileged port, we can presume that the client was privileged to be
/freebsd/usr.sbin/lpr/lpc/
H A Dlpc.h37 #define LPC_PRIVCMD 0x0001 /* a privileged command */
43 const int c_opts; /* flags (eg: privileged command) */
/freebsd/crypto/openssh/openbsd-compat/
H A Dbsd-statvfs.h55 /* non-privileged process. */
59 /* non-privileged process. */
/freebsd/contrib/pf/pflogd/
H A Dprivsep.c235 * send the snaplength to privileged process
243 errx(1, "%s: called from privileged portion", __func__); in priv_set_snaplen()
266 errx(1, "%s: called from privileged portion", __func__); in priv_open_log()
281 errx(1, "%s: called from privileged portion\n", __func__); in priv_move_log()
/freebsd/share/man/man8/
H A Dyp.8406 maps in response to requests that originate on privileged ports.
407 Since only the super-user is allowed to bind to a privileged port,
408 the server assumes that all such requests come from privileged
410 All other requests are denied: requests from non-privileged

12345678910>>...14