/freebsd/crypto/openssh/ |
H A D | uidswap.c | 50 static int privileged = 0; variable 72 privileged = 0; in temporarily_use_uid() 78 privileged = 0; in temporarily_use_uid() 83 privileged = 1; in temporarily_use_uid() 123 /* Propagate the privileged gid to all of our gids. */ in temporarily_use_uid() 126 /* Propagate the privileged uid to all of our uids. */ in temporarily_use_uid() 139 * Restores to the original (privileged) uid. 144 /* it's a no-op unless privileged */ in restore_uid() 145 if (!privileged) { in restore_uid() 154 /* Set the effective uid back to the saved privileged uid. */ in restore_uid() [all …]
|
H A D | gss-serv.c | 96 /* Privileged (called from ssh_gssapi_server_ctx) */ 132 /* Privileged */ 174 /* Privileged */ 274 /* Privileged (called from accept_secure_ctx) */ 357 /* Privileged */ 385 /* Privileged */ 395 /* Privileged */
|
H A D | README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 29 --with-privsep-user=user Specify non-privileged user for privilege separation 50 process 6917 is the privileged monitor process, 6919 is the user owned
|
/freebsd/sys/dev/mthca/ |
H A D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | zfs_allow_012_neg.ksh | 36 # Scan all permissions one by one to verify privileged user 41 # 2. Verify privileged user can not use permissions properly when 53 log_assert "Verify privileged user can not use permissions properly when " \ 92 log_pass "Verify privileged user can not use permissions properly when " \
|
H A D | zfs_allow_010_pos.ksh | 36 # Scan the following permissions one by one to verify privileged user 41 # 2. Verify privileged user has correct permission without any other 47 log_assert "Verify privileged user has correct permissions once which was "\ 193 log_pass "Verify privileged user has correct permissions " \
|
/freebsd/tests/sys/cddl/zfs/tests/delegate/ |
H A D | zfs_allow_012_neg.ksh | 36 # Scan all permissions one by one to verify privileged user 41 # 2. Verify privileged user can not use permissions properly when 54 log_assert "Verify privileged user can not use permissions properly when " \ 79 log_pass "Verify privileged user can not use permissions properly when " \
|
H A D | zfs_allow_010_pos.ksh | 36 # Scan the following permissions one by one to verify privileged user 41 # 2. Verify privileged user has correct permission without any other 56 log_assert "Verify privileged user has correct permissions once which was "\ 118 log_pass "Verify privileged user has correct permissions " \
|
/freebsd/share/man/man4/ |
H A D | mac_priority.4 | 66 realtime policy active, privileged users may use the 69 Privileged applications can promote threads and processes to realtime 74 When the idletime policy is active, privileged users may use the 77 Privileged applications can demote threads and processes to idle
|
/freebsd/crypto/openssh/contrib/cygwin/ |
H A D | README | 30 --user -u <account> privileged user for service, default 'cyg_server'. 31 --pwd -w <passwd> Use "pwd" as password for privileged user. 32 --privileged On Windows XP, require privileged user
|
H A D | ssh-host-config | 153 csih_error_recoverable "under a privileged account successfully." 154 csih_error_recoverable "Make sure to create a non-privileged user 'sshd'" 399 # Enforce using privileged user on 64 bit Vista or W7 under WOW64 406 csih_inform "user account. You need to have or to create a privileged" 421 csih_error_recoverable "There was a serious problem creating a privileged user." 442 # $password is empty, or $run_service_as is some privileged user and 571 --privileged ) 587 echo " --user -u <account> privileged user for service, default 'cyg_server'." 588 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 589 echo " --privileged On Windows XP, require privileged user"
|
/freebsd/lib/libc/rpc/ |
H A D | bindresvport.3 | 9 .Nd bind a socket to a privileged IP port 25 are used to bind a socket descriptor to a privileged 60 Only root can bind to a privileged port; this call will fail for any
|
/freebsd/usr.sbin/jail/ |
H A D | jail.8 | 553 network subsystems, extra caution should be used where privileged access 556 Normally, privileged users inside a jail are treated as unprivileged by 558 When this parameter is set, such users are treated as privileged, and 562 privileged users inside the jail will be able to mount and unmount file 572 privileged users inside the jail will be able to mount and unmount the 663 Allow privileged process in the jail to manipulate filesystem extended 666 Allow privileged process in the jail to slowly adjusting global operating system 671 Allow privileged process in the jail to set global operating system data 695 privileged users inside the jail will be able to mount and unmount the 703 privileged users inside the jail will be able to mount and unmount [all …]
|
/freebsd/share/doc/papers/jail/ |
H A D | paper.ms | 161 these privileged operations can be used to manage system hardware and 204 and users is very difficult. Many privileged operations in UNIX seem 238 multiple users and a privileged root user in each jail, while 252 privileged process calls the jail(2) syscall, with a description of the jail as an 268 system resources and perform privileged operations is sharply curtailed, and 289 associated with privileged calls are wholesale disabled due to the nature of the 295 root privileges will find that many restrictions apply to the privileged calls 345 Other privileged activities are permitted as long as they are limited to the 382 between processes, and to files, network resources, and privileged
|
/freebsd/usr.sbin/rpcbind/ |
H A D | rpcbind.8 | 144 to use non-privileged ports for outgoing connections, preventing non-privileged 147 to connect to services from a privileged port.
|
/freebsd/sys/contrib/xen/ |
H A D | pmu.h | 115 * Physical processor on which the interrupt occurred. On non-privileged 121 * Domain that was interrupted. On non-privileged guests set to DOMID_SELF. 122 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
|
/freebsd/usr.sbin/rpc.yppasswdd/ |
H A D | rpc.yppasswdd.8 | 296 received from non-privileged ports are rejected. 298 behavior prevents any client systems that to not use privileged 305 disables the privileged port check so that it will work with 307 clients that do not use privileged ports.
|
/freebsd/lib/libsys/ |
H A D | setresuid.2 | 51 Privileged processes may set these IDs 70 The calling process was not privileged
|
/freebsd/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 70 /* 0 */ { 0, 0, 0, 0 }, /* privileged */ 71 /* 1 */ { 0, 0, 0, 1 }, /* privileged + issetugid */ 91 /* privileged on privileged */ 96 /* privileged on unprivileged */ 101 /* unprivileged on privileged */
|
/freebsd/contrib/ntp/libntp/lib/isc/include/isc/ |
H A D | task.h | 628 * Set or unset the task's "privileged" flag depending on the value of 632 * but when the task manager has been set to privileged exeuction mode via 634 * and all other tasks will wait until they're done. Once all privileged 714 * In privileged execution mode, only tasks that have had the "privilege" 717 * and proceeds with running non-privileged ready tasks. This means it is 718 * necessary to have at least one privileged task waiting on the ready 719 * queue *before* setting the manager into privileged execution mode,
|
/freebsd/contrib/blocklist/bin/ |
H A D | blacklistd.8 | 95 It is also less meaningful when it comes to connections using non-privileged 98 a UDP privileged port, we can presume that the client was privileged to be
|
/freebsd/usr.sbin/lpr/lpc/ |
H A D | lpc.h | 37 #define LPC_PRIVCMD 0x0001 /* a privileged command */ 43 const int c_opts; /* flags (eg: privileged command) */
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-statvfs.h | 55 /* non-privileged process. */ 59 /* non-privileged process. */
|
/freebsd/contrib/pf/pflogd/ |
H A D | privsep.c | 235 * send the snaplength to privileged process 243 errx(1, "%s: called from privileged portion", __func__); in priv_set_snaplen() 266 errx(1, "%s: called from privileged portion", __func__); in priv_open_log() 281 errx(1, "%s: called from privileged portion\n", __func__); in priv_move_log()
|
/freebsd/share/man/man8/ |
H A D | yp.8 | 406 maps in response to requests that originate on privileged ports. 407 Since only the super-user is allowed to bind to a privileged port, 408 the server assumes that all such requests come from privileged 410 All other requests are denied: requests from non-privileged
|