Lines Matching defs:set
112 * operations require that the caller have an effective set that includes
120 * priv can be set to PRIV_ALL to indicate that all privileges are
128 * For (1), priv should be set to the specific privilege, and allzone
129 * should be set to B_FALSE.
130 * For (2), priv should be set to the specific privilege, and allzone
131 * should be set to B_TRUE.
132 * For (3), priv should be set to PRIV_ALL, and allzone should be set
138 * The privileges are checked against the Effective set for
139 * ordinary processes and checked against the Limit set
328 priv_set_t set;
335 priv_fillset(&set);
337 set = *ZONEPRIVS(cr);
339 priv_emptyset(&set);
340 priv_addset(&set, priv);
342 ret = klpd_call(cr, &set, ap);
482 * Check whether all privileges in the required set are present.
517 * Privilege debugging; special case "one privilege in set".
661 * to a boolean variable which will be set to either true or false,
676 * and no mount options need to be set.
688 * or we're doing a remount and VFS_REMOUNT will be set), zones
761 * If we're not the local super user, we set the "restrict"
1078 * Normal: verify that subject can set the file setid flags.
1098 * Are we allowed to retain the set-uid/set-gid bits when
1100 * "issuid" should be true when set-uid; only in that case
1115 * Normal: verify that subject can set the file setgid flag.
1218 "set file sticky"));
1268 * Check privilege if attempting to set the
1277 * Check for privilege if attempting to set the
1375 * - permission to add set-gid bit
1380 * ovap. In certain situations set-uid/set-gid bits need to be removed;
1402 * If ATTR_NOACLCHECK is set in the flags, then we don't
1415 * for two things: the privilege to set the mode at all
1417 * to add the set-uid bit, if we're not the owner.
1418 * In the specific case of creating a set-uid root
1467 * If the file has either the set UID or set GID bits
1468 * set and the caller can set the bits, then leave them.
1476 * time other than the current (ATTR_UTIME flag set).
1477 * If setting the current time (ATTR_UTIME not set) then
1732 * Processor set binding.
1866 /* zone.* rctls can only be set from the global zone */
2219 * in the required privilege set before doing the check.
2309 * Determine if the subject may set the process contract FMRI value
2358 * set when a change in other terms would normally require a change in
2359 * the critical set. Just tests privilege and audits on success.
2470 * Add privileges to a particular privilege set; this is called when the
2473 * What we are allowed to have is in the Observed Permitted set; so
2512 * PRIV_FILE_FLAG_SET - set extended system attributes