| /linux/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 5 The execve system call can grant a newly-started program privileges that 8 gaining these privileges as well, the kernel and user code must be 55 escalate its privileges by directly attacking setuid, setgid, and
|
| H A D | seccomp_filter.rst | 72 run with ``CAP_SYS_ADMIN`` privileges in its namespace. If these are not 74 programs cannot be applied to child processes with greater privileges
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-bus-event_source-devices-hv_gpci | 94 * User needs root privileges to read data from this sysfs file. 126 * User needs root privileges to read data from this sysfs file. 158 * User needs root privileges to read data from this sysfs file. 190 * User needs root privileges to read data from this sysfs file. 222 * User needs root privileges to read data from this sysfs file.
|
| H A D | sysfs-bus-coreboot | 44 requires root privileges given this is exposing a small subset
|
| /linux/security/safesetid/ |
| H A D | Kconfig | 11 the given UIDs/GIDs from obtaining auxiliary privileges associated
|
| /linux/Documentation/userspace-api/media/v4l/ |
| H A D | vidioc-dbg-g-register.rst | 49 superuser privileges. Additionally the Linux kernel must be compiled 159 Insufficient permissions. Root privileges are required to execute
|
| H A D | open.rst | 205 descriptor. Applications can request additional access privileges using
|
| /linux/Documentation/trace/ |
| H A D | mmiotrace.rst | 51 If not (requires root privileges):: 57 Activate mmiotrace (requires root privileges):: 76 Shut down mmiotrace (requires root privileges)::
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 20 The filesystem daemon is running with the privileges of the mounting 228 A) mount owner should not be able to get elevated privileges with the 240 A) The mount owner could gain elevated privileges by either:
|
| /linux/drivers/net/ethernet/emulex/benet/ |
| H A D | be_main.c | 1940 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt() 1941 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt() 1944 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt() 1962 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt() 1963 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt() 1966 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt() 4256 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup() 4258 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup() 4260 vf_cfg->privileges | in be_vf_setup() 4264 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
|
| /linux/Documentation/admin-guide/ |
| H A D | perf-security.rst | 64 Linux divides the privileges traditionally associated with superuser 129 privileges [6]_ :
|
| H A D | spkguide.txt | 163 which require root privileges. 655 Both require root privileges. 660 /etc/rc.d. Execute the following command with root privileges: 1176 root privileges. 1203 This script needs root privileges to run, so if it is not installed as 1222 Note that talkwith must always be executed with root privileges.
|
| /linux/Documentation/arch/powerpc/ |
| H A D | dexcr.rst | 171 can still clear its own NPHIE aspect without privileges).
|
| H A D | vas-api.rst | 100 privileges are needed to open the device. Each window corresponds to one
|
| /linux/Documentation/wmi/devices/ |
| H A D | uniwill-laptop.rst | 97 The EC can be accessed under Windows using powershell (requires admin privileges):
|
| /linux/tools/testing/selftests/tc-testing/ |
| H A D | README | 50 To use tdc, root privileges are required. This is because the
|
| /linux/Documentation/arch/s390/ |
| H A D | monreader.rst | 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to
|
| /linux/tools/power/cpupower/po/ |
| H A D | ka.po | 245 msgid "Subcommand %s needs root privileges\n" 819 msgid "Intel's performance bias setting needs root privileges\n"
|
| H A D | cs.po | 229 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
| H A D | pt.po | 222 msgid "Subcommand %s needs root privileges\n" 778 msgid "Intel's performance bias setting needs root privileges\n"
|
| H A D | fr.po | 224 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
| H A D | it.po | 224 msgid "Subcommand %s needs root privileges\n" 776 msgid "Intel's performance bias setting needs root privileges\n"
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 102 'group' and 'other'), each of which may be granted certain privileges 244 extra privileges, based on the annotations on the executable file.
|
| /linux/Documentation/virt/uml/ |
| H A D | user_mode_linux_howto_v2.rst | 227 Network configuration privileges 230 The majority of the supported networking modes need ``root`` privileges. 525 no special privileges for the UDP mode. 549 BESS transport does not require any special privileges.
|
| /linux/scripts/ |
| H A D | spelling.txt | 1263 priviledges||privileges 1264 privleges||privileges
|