Home
last modified time | relevance | path

Searched refs:privileges (Results 1 – 25 of 32) sorted by relevance

12

/titanic_50/usr/src/lib/udapl/udapl_tavor/common/
H A Ddapl_lmr_create.c57 IN DAT_MEM_PRIV_FLAGS privileges,
68 IN DAT_MEM_PRIV_FLAGS privileges,
85 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_virtual() argument
100 reg_desc, length, (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_virtual()
110 length, privileges); in dapl_lmr_create_virtual()
113 length, shm_cookie, privileges); in dapl_lmr_create_virtual()
175 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_lmr() argument
190 pz, privileges, in dapl_lmr_create_lmr()
206 (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_lmr()
214 dat_status = dapls_ib_mr_register_lmr(ia, lmr, privileges); in dapl_lmr_create_lmr()
[all …]
H A Ddapl_lmr_util.c103 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_lmr_convert_privileges() argument
111 if (DAT_MEM_PRIV_LOCAL_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges()
114 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_lmr_convert_privileges()
117 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges()
120 if (DAT_MEM_PRIV_RO_DISABLE_FLAG & privileges) { in dapl_lmr_convert_privileges()
H A Ddapl_rmr_util.c103 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_rmr_convert_privileges() argument
107 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_rmr_convert_privileges()
110 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_rmr_convert_privileges()
/titanic_50/usr/src/uts/common/fs/smbsrv/
H A Dsmb_authenticate.c391 uint32_t privileges; in smb_auth_get_token() local
443 privileges = smb_priv_xlate(token); in smb_auth_get_token()
446 token->tkn_flags, privileges, token->tkn_audit_sid); in smb_auth_get_token()
497 uint32_t privileges = 0; in smb_priv_xlate() local
500 privileges |= SMB_USER_PRIV_BACKUP; in smb_priv_xlate()
503 privileges |= SMB_USER_PRIV_RESTORE; in smb_priv_xlate()
506 privileges |= SMB_USER_PRIV_TAKE_OWNERSHIP; in smb_priv_xlate()
509 privileges |= SMB_USER_PRIV_SECURITY; in smb_priv_xlate()
511 return (privileges); in smb_priv_xlate()
H A Dsmb_user.c265 uint32_t privileges, in smb_user_logon() argument
291 smb_user_setcred(user, cr, privileges); in smb_user_logon()
576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument
583 if (privileges & (SMB_USER_PRIV_BACKUP | SMB_USER_PRIV_RESTORE)) in smb_user_setcred()
587 if (privileges & SMB_USER_PRIV_BACKUP) { in smb_user_setcred()
592 if (privileges & SMB_USER_PRIV_RESTORE) { in smb_user_setcred()
603 user->u_privileges = privileges; in smb_user_setcred()
/titanic_50/usr/src/lib/smbsrv/libfksmbsrv/common/
H A Dfksmb_cred.c50 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument
54 user->u_privileges = privileges; in smb_user_setcred()
/titanic_50/usr/src/uts/common/os/
H A Dpriv_defs31 # add the new privilege at the end; for ordinary releases privileges
108 effective uid of 0 ALL privileges are required.
329 Assuming uid 0 requires all privileges to be asserted.
364 device, a process must also have sufficient privileges to read from
399 for processes which do not have all zone privileges asserted.
400 Unless a process has all zone privileges, the mount(2)
403 Regardless of privileges, a process running in a non-global zone may
550 required. Thus the process must have MAC and DAC privileges that
609 Set of privileges currently in effect.
613 Set of privileges that comes into effect on exec.
[all …]
/titanic_50/usr/src/lib/udapl/udapl_tavor/include/
H A Ddapl_rmr_util.h63 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
H A Ddapl_lmr_util.h64 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
H A Ddapl_adapter_util.h186 IN DAT_MEM_PRIV_FLAGS privileges);
194 IN DAT_MEM_PRIV_FLAGS privileges);
202 IN DAT_MEM_PRIV_FLAGS privileges);
/titanic_50/usr/src/pkg/manifests/
H A Dsystem-library-policykit.mf28 value="Toolkit for controlling privileges (freedesktop.org)"
45 desc="Toolkit for controlling privileges (freedesktop.org)" \
H A DSUNWcs.man5.inc28 file path=usr/share/man/man5/privileges.5
/titanic_50/usr/src/uts/sparc/os/
H A Ddevice_policy7 # Default open privileges, must be first entry in the file.
/titanic_50/usr/src/uts/intel/os/
H A Ddevice_policy7 # Default open privileges, must be first entry in the file.
/titanic_50/usr/src/lib/udapl/libdat/common/
H A Dudat_api.c51 IN DAT_MEM_PRIV_FLAGS privileges, in dat_lmr_create() argument
66 privileges, in dat_lmr_create()
/titanic_50/usr/src/cmd/ssh/
H A DREADME.altprivsep57 required; root's privilege is broken down into many privileges and
118 What privileges does an SSH server need then?
134 An ssh server requires practically all privileges for user
139 Post-authentication an ssh server requires the following privileges:
169 These credentials may require a large set of privileges. The
183 that drops most privileges and access to privileged resources after
185 some privileges, such as PRIV_PROC_SETID, available to any attacker
198 It consists of a monitor, which retains all privileges and access to
295 is needed for further operation. The child drops privileges after
417 require fewer privileges. In practice this means overhauling the
[all …]
/titanic_50/usr/src/cmd/modload/
H A Dextra_privs27 # File which defines additional driver specific privileges.
/titanic_50/usr/src/man/man5/
H A DMakefile108 privileges.5 \
/titanic_50/usr/src/lib/udapl/udapl_tavor/tavor/
H A Ddapl_tavor_ibtf_util.c710 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register() argument
738 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register()
796 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_shared() argument
824 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_shared()
942 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_lmr() argument
964 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_lmr()
/titanic_50/usr/src/cmd/ssh/doc/
H A DOVERVIEW106 privileges are only used to make the connection (from a
107 privileged socket). Any extra privileges are dropped before
/titanic_50/usr/src/cmd/auditrecord/
H A Daudit_record_attr.txt718 format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5
721 comment=privileges if the limit or inheritable set are changed:
1071 comment=privileges required for reading:
1072 comment=privileges required for writing
1077 comment=privileges required for reading:
1078 comment=privileges required for writing
1743 case=operation privileges off
1746 comment=privileges actually switched off
1747 case=operation privileges on
1750 comment=privileges actually switched on
[all …]
/titanic_50/usr/src/test/zfs-tests/doc/
H A DREADME52 - A non-root user with the full set of basic privileges and the ability
/titanic_50/usr/src/uts/common/smbsrv/ndl/
H A Dlsarpc.ndl706 * by a SID. This handle can be used to enumerate account privileges.
724 * Enumerate the list of privileges held by the specified account. The
748 OUT struct mslsa_PrivilegeSet *privileges;
/titanic_50/usr/src/cmd/cmd-inet/sbin/dhcpagent/
H A DREADME.v6742 Nevada is now privilege-aware and runs with limited privileges,
744 privileges.
746 A simple work-around for this issue is to rip out the "privileges="
755 ought to run with reduced privileges. It could, but it still needs
756 the ability to grant "all" (traditional UNIX root) privileges to the
1036 - The various attributes of the IPC commands (requires privileges,
1189 - Change privileges so that dhcpagent can be launched successfully
/titanic_50/usr/src/cmd/sendmail/libmilter/
H A DREADME25 good security practice to run a program only with root privileges

12