Lines Matching full:unprivileged
54 ID is 0, referred to as superuser or root), and b) unprivileged
60 Unprivileged processes are subject to a full security permission check
67 files of unprivileged users.
69 Unprivileged processes with enabled CAP_PERFMON capability are treated
87 Prior Linux v5.9 unprivileged processes using perf_events system call
90 So unprivileged processes provided with CAP_SYS_PTRACE capability are
96 Other capabilities being granted to unprivileged processes can
223 Unprivileged users
226 perf_events *scope* and *access* control for unprivileged processes
243 imposed but ignored for unprivileged processes with CAP_IPC_LOCK
252 unprivileged processes with CAP_IPC_LOCK capability.
259 unprivileged processes with CAP_IPC_LOCK capability.