/titanic_50/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_lmr_create.c | 57 IN DAT_MEM_PRIV_FLAGS privileges, 68 IN DAT_MEM_PRIV_FLAGS privileges, 85 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_virtual() argument 100 reg_desc, length, (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_virtual() 110 length, privileges); in dapl_lmr_create_virtual() 113 length, shm_cookie, privileges); in dapl_lmr_create_virtual() 175 IN DAT_MEM_PRIV_FLAGS privileges, in dapl_lmr_create_lmr() argument 190 pz, privileges, in dapl_lmr_create_lmr() 206 (DAT_PZ_HANDLE) pz, privileges); in dapl_lmr_create_lmr() 214 dat_status = dapls_ib_mr_register_lmr(ia, lmr, privileges); in dapl_lmr_create_lmr() [all …]
|
H A D | dapl_lmr_util.c | 103 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_lmr_convert_privileges() argument 111 if (DAT_MEM_PRIV_LOCAL_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges() 114 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_lmr_convert_privileges() 117 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_lmr_convert_privileges() 120 if (DAT_MEM_PRIV_RO_DISABLE_FLAG & privileges) { in dapl_lmr_convert_privileges()
|
H A D | dapl_rmr_util.c | 103 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges) in dapl_rmr_convert_privileges() argument 107 if (DAT_MEM_PRIV_REMOTE_READ_FLAG & privileges) { in dapl_rmr_convert_privileges() 110 if (DAT_MEM_PRIV_REMOTE_WRITE_FLAG & privileges) { in dapl_rmr_convert_privileges()
|
/titanic_50/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_authenticate.c | 391 uint32_t privileges; in smb_auth_get_token() local 443 privileges = smb_priv_xlate(token); in smb_auth_get_token() 446 token->tkn_flags, privileges, token->tkn_audit_sid); in smb_auth_get_token() 497 uint32_t privileges = 0; in smb_priv_xlate() local 500 privileges |= SMB_USER_PRIV_BACKUP; in smb_priv_xlate() 503 privileges |= SMB_USER_PRIV_RESTORE; in smb_priv_xlate() 506 privileges |= SMB_USER_PRIV_TAKE_OWNERSHIP; in smb_priv_xlate() 509 privileges |= SMB_USER_PRIV_SECURITY; in smb_priv_xlate() 511 return (privileges); in smb_priv_xlate()
|
H A D | smb_user.c | 265 uint32_t privileges, in smb_user_logon() argument 291 smb_user_setcred(user, cr, privileges); in smb_user_logon() 576 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument 583 if (privileges & (SMB_USER_PRIV_BACKUP | SMB_USER_PRIV_RESTORE)) in smb_user_setcred() 587 if (privileges & SMB_USER_PRIV_BACKUP) { in smb_user_setcred() 592 if (privileges & SMB_USER_PRIV_RESTORE) { in smb_user_setcred() 603 user->u_privileges = privileges; in smb_user_setcred()
|
/titanic_50/usr/src/lib/smbsrv/libfksmbsrv/common/ |
H A D | fksmb_cred.c | 50 smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) in smb_user_setcred() argument 54 user->u_privileges = privileges; in smb_user_setcred()
|
/titanic_50/usr/src/uts/common/os/ |
H A D | priv_defs | 31 # add the new privilege at the end; for ordinary releases privileges 108 effective uid of 0 ALL privileges are required. 329 Assuming uid 0 requires all privileges to be asserted. 364 device, a process must also have sufficient privileges to read from 399 for processes which do not have all zone privileges asserted. 400 Unless a process has all zone privileges, the mount(2) 403 Regardless of privileges, a process running in a non-global zone may 550 required. Thus the process must have MAC and DAC privileges that 609 Set of privileges currently in effect. 613 Set of privileges that comes into effect on exec. [all …]
|
/titanic_50/usr/src/lib/udapl/udapl_tavor/include/ |
H A D | dapl_rmr_util.h | 63 dapl_rmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
|
H A D | dapl_lmr_util.h | 64 dapl_lmr_convert_privileges(IN DAT_MEM_PRIV_FLAGS privileges);
|
H A D | dapl_adapter_util.h | 186 IN DAT_MEM_PRIV_FLAGS privileges); 194 IN DAT_MEM_PRIV_FLAGS privileges); 202 IN DAT_MEM_PRIV_FLAGS privileges);
|
/titanic_50/usr/src/pkg/manifests/ |
H A D | system-library-policykit.mf | 28 value="Toolkit for controlling privileges (freedesktop.org)" 45 desc="Toolkit for controlling privileges (freedesktop.org)" \
|
H A D | SUNWcs.man5.inc | 28 file path=usr/share/man/man5/privileges.5
|
/titanic_50/usr/src/uts/sparc/os/ |
H A D | device_policy | 7 # Default open privileges, must be first entry in the file.
|
/titanic_50/usr/src/uts/intel/os/ |
H A D | device_policy | 7 # Default open privileges, must be first entry in the file.
|
/titanic_50/usr/src/lib/udapl/libdat/common/ |
H A D | udat_api.c | 51 IN DAT_MEM_PRIV_FLAGS privileges, in dat_lmr_create() argument 66 privileges, in dat_lmr_create()
|
/titanic_50/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 57 required; root's privilege is broken down into many privileges and 118 What privileges does an SSH server need then? 134 An ssh server requires practically all privileges for user 139 Post-authentication an ssh server requires the following privileges: 169 These credentials may require a large set of privileges. The 183 that drops most privileges and access to privileged resources after 185 some privileges, such as PRIV_PROC_SETID, available to any attacker 198 It consists of a monitor, which retains all privileges and access to 295 is needed for further operation. The child drops privileges after 417 require fewer privileges. In practice this means overhauling the [all …]
|
/titanic_50/usr/src/cmd/modload/ |
H A D | extra_privs | 27 # File which defines additional driver specific privileges.
|
/titanic_50/usr/src/man/man5/ |
H A D | Makefile | 108 privileges.5 \
|
/titanic_50/usr/src/lib/udapl/udapl_tavor/tavor/ |
H A D | dapl_tavor_ibtf_util.c | 710 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register() argument 738 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register() 796 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_shared() argument 824 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_shared() 942 IN DAT_MEM_PRIV_FLAGS privileges) in dapls_ib_mr_register_lmr() argument 964 dapl_lmr_convert_privileges(privileges); in dapls_ib_mr_register_lmr()
|
/titanic_50/usr/src/cmd/ssh/doc/ |
H A D | OVERVIEW | 106 privileges are only used to make the connection (from a 107 privileged socket). Any extra privileges are dropped before
|
/titanic_50/usr/src/cmd/auditrecord/ |
H A D | audit_record_attr.txt | 718 format=path1:path2:[privileges]3:[privileges]3:[proc]4:exec_args:[exec_env]5 721 comment=privileges if the limit or inheritable set are changed: 1071 comment=privileges required for reading: 1072 comment=privileges required for writing 1077 comment=privileges required for reading: 1078 comment=privileges required for writing 1743 case=operation privileges off 1746 comment=privileges actually switched off 1747 case=operation privileges on 1750 comment=privileges actually switched on [all …]
|
/titanic_50/usr/src/test/zfs-tests/doc/ |
H A D | README | 52 - A non-root user with the full set of basic privileges and the ability
|
/titanic_50/usr/src/uts/common/smbsrv/ndl/ |
H A D | lsarpc.ndl | 706 * by a SID. This handle can be used to enumerate account privileges. 724 * Enumerate the list of privileges held by the specified account. The 748 OUT struct mslsa_PrivilegeSet *privileges;
|
/titanic_50/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | README.v6 | 742 Nevada is now privilege-aware and runs with limited privileges, 744 privileges. 746 A simple work-around for this issue is to rip out the "privileges=" 755 ought to run with reduced privileges. It could, but it still needs 756 the ability to grant "all" (traditional UNIX root) privileges to the 1036 - The various attributes of the IPC commands (requires privileges, 1189 - Change privileges so that dhcpagent can be launched successfully
|
/titanic_50/usr/src/cmd/sendmail/libmilter/ |
H A D | README | 25 good security practice to run a program only with root privileges
|