/titanic_41/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_lmr_create.c | 57 IN DAT_MEM_PRIV_FLAGS privileges, 68 IN DAT_MEM_PRIV_FLAGS privileges, 85 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_virtual() argument 100 reg_desc, length, (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_virtual() 110 length, privileges); in dapl_lmr_create_virtual() 113 length, shm_cookie, privileges); in dapl_lmr_create_virtual() 175 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_lmr() argument 190 pz, privileges, in dapl_lmr_create_lmr() 206 (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_lmr() 214 dat_status = dapls_ib_mr_register_lmr(ia, lmr, privileges); in dapl_lmr_create_lmr() [all …]
|
H A D | dapl_lmr_util.c | 103 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_lmr_convert_privileges() argument 111 if (DAT_MEM_PRIV_LOCAL_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges() 114 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_lmr_convert_privileges() 117 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges() 120 if (DAT_MEM_PRIV_RO_DISABLE_FLAG & privileges) { in dapl_lmr_convert_privileges()
|
H A D | dapl_rmr_util.c | 103 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_rmr_convert_privileges() argument 107 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_rmr_convert_privileges() 110 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_rmr_convert_privileges()
|
/titanic_41/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_session_setup_andx.c | 238 uint32_t privileges; in smb_authenticate_core() local 335 privileges = smb_priv_xlate(token); in smb_authenticate_core() 339 token->tkn_flags, privileges, token->tkn_audit_sid); in smb_authenticate_core() 487 uint32_t privileges = 0; in smb_priv_xlate() local 490 privileges |= SMB_USER_PRIV_BACKUP; in smb_priv_xlate() 493 privileges |= SMB_USER_PRIV_RESTORE; in smb_priv_xlate() 496 privileges |= SMB_USER_PRIV_TAKE_OWNERSHIP; in smb_priv_xlate() 499 privileges |= SMB_USER_PRIV_SECURITY; in smb_priv_xlate() 501 return (privileges); in smb_priv_xlate()
|
H A D | smb_user.c | 188 uint32_t privileges, in smb_user_login() argument 214 smb_user_setcred(user, cr, privileges); in smb_user_login() 548 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument 555 if (privileges & (SMB_USER_PRIV_BACKUP | SMB_USER_PRIV_RESTORE)) in smb_user_setcred() 559 if (privileges & SMB_USER_PRIV_BACKUP) { in smb_user_setcred() 564 if (privileges & SMB_USER_PRIV_RESTORE) { in smb_user_setcred() 575 user->u_privileges = privileges; in smb_user_setcred()
|
/titanic_41/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_cred.c | 50 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument 54 user->u_privileges = privileges; in smb_user_setcred()
|
/titanic_41/usr/src/uts/common/os/ |
H A D | priv_defs | 31 # add the new privilege at the end; for ordinary releases privileges 108 effective uid of 0 ALL privileges are required. 325 Assuming uid 0 requires all privileges to be asserted. 360 device, a process must also have sufficient privileges to read from 395 for processes which do not have all zone privileges asserted. 396 Unless a process has all zone privileges, the mount(2) 399 Regardless of privileges, a process running in a non-global zone may 546 required. Thus the process must have MAC and DAC privileges that 605 Set of privileges currently in effect. 609 Set of privileges that comes into effect on exec. [all …]
|
/titanic_41/usr/src/lib/udapl/udapl_tavor/include/ |
H A D | dapl_rmr_util.h | 63 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
|
H A D | dapl_lmr_util.h | 64 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
|
H A D | dapl_adapter_util.h | 186 IN DAT_MEM_PRIV_FLAGS privileges); 194 IN DAT_MEM_PRIV_FLAGS privileges); 202 IN DAT_MEM_PRIV_FLAGS privileges);
|
/titanic_41/usr/src/pkg/manifests/ |
H A D | system-library-policykit.mf | 28 value="Toolkit for controlling privileges (freedesktop.org)" 45 desc="Toolkit for controlling privileges (freedesktop.org)" \
|
H A D | SUNWcs.man5.inc | 28 file path=usr/share/man/man5/privileges.5
|
/titanic_41/usr/src/uts/sparc/os/ |
H A D | device_policy | 7 # Default open privileges, must be first entry in the file.
|
/titanic_41/usr/src/uts/intel/os/ |
H A D | device_policy | 7 # Default open privileges, must be first entry in the file.
|
/titanic_41/usr/src/lib/udapl/libdat/common/ |
H A D | udat_api.c | 51 IN DAT_MEM_PRIV_FLAGS privileges, in dat_lmr_create() argument 66 privileges, in dat_lmr_create()
|
/titanic_41/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 57 required; root's privilege is broken down into many privileges and 118 What privileges does an SSH server need then? 134 An ssh server requires practically all privileges for user 139 Post-authentication an ssh server requires the following privileges: 169 These credentials may require a large set of privileges. The 183 that drops most privileges and access to privileged resources after 185 some privileges, such as PRIV_PROC_SETID, available to any attacker 198 It consists of a monitor, which retains all privileges and access to 295 is needed for further operation. The child drops privileges after 417 require fewer privileges. In practice this means overhauling the [all …]
|
/titanic_41/usr/src/cmd/modload/ |
H A D | extra_privs | 27 # File which defines additional driver specific privileges.
|
/titanic_41/usr/src/man/man5/ |
H A D | Makefile | 104 privileges.5 \
|
/titanic_41/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_ibtf_util.c | 710 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register() argument 738 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register() 796 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_shared() argument 824 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_shared() 942 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_lmr() argument 964 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_lmr()
|
/titanic_41/usr/src/cmd/ssh/doc/ |
H A D | OVERVIEW | 106 privileges are only used to make the connection (from a 107 privileged socket). Any extra privileges are dropped before
|
/titanic_41/usr/src/cmd/auditrecord/ |
H A D | audit_record_attr.txt | 718 format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5 721 comment=privileges if the limit or inheritable set are changed: 1071 comment=privileges required for reading: 1072 comment=privileges required for writing 1077 comment=privileges required for reading: 1078 comment=privileges required for writing 1743 case=operation privileges off 1746 comment=privileges actually switched off 1747 case=operation privileges on 1750 comment=privileges actually switched on [all …]
|
/titanic_41/usr/src/test/zfs-tests/doc/ |
H A D | README | 52 - A non-root user with the full set of basic privileges and the ability
|
/titanic_41/usr/src/uts/common/smbsrv/ndl/ |
H A D | lsarpc.ndl | 706 * by a SID. This handle can be used to enumerate account privileges. 724 * Enumerate the list of privileges held by the specified account. The 748 OUT struct mslsa_PrivilegeSet *privileges;
|
/titanic_41/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | README.v6 | 742 Nevada is now privilege-aware and runs with limited privileges, 744 privileges. 746 A simple work-around for this issue is to rip out the "privileges=" 755 ought to run with reduced privileges. It could, but it still needs 756 the ability to grant "all" (traditional UNIX root) privileges to the 1036 - The various attributes of the IPC commands (requires privileges, 1189 - Change privileges so that dhcpagent can be launched successfully
|
/titanic_41/usr/src/cmd/sendmail/libmilter/ |
H A D | README | 25 good security practice to run a program only with root privileges
|