Searched refs:permitted (Results 1 - 25 of 55) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dcapability.h47 __u32 permitted; member in struct:__user_cap_data_struct
72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon17246
101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data
171 * Transfer any capability in your permitted set to any pid,
172 * remove any capability in your permitted set from any pid
509 const kernel_cap_t permitted)
513 cap_intersect(permitted, __cap_fs_set));
523 const kernel_cap_t permitted)
527 cap_intersect(permitted, __cap_nfsd_set));
508 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
522 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
H A Dsecurity.h59 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
63 const kernel_cap_t *permitted);
747 * from the kernel and should typically be permitted.
1230 * Get the @effective, @inheritable, and @permitted capability sets for
1237 * @permitted contains the permitted capability set.
1240 * Set the @effective, @inheritable, and @permitted capability sets for
1246 * @permitted contains the permitted capability set.
1370 kernel_cap_t *inheritable, kernel_cap_t *permitted);
1833 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1841 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/
H A Dcapability.c156 * @dataptr: pointer to struct that contains the effective, permitted,
185 kdata[i].permitted = pP.cap[i];
221 * @data: pointer to struct that contains the effective, permitted,
229 * I: any raised capabilities must be a subset of the old permitted
230 * P: any raised capabilities must be a subset of the old permitted
231 * E: must be set to a subset of new permitted
239 kernel_cap_t inheritable, permitted, effective; local
264 permitted.cap[i] = kdata[i].permitted;
269 permitted
[all...]
H A Dauditsc.c90 kernel_cap_t permitted; member in struct:audit_cap_data
1204 kernel_cap_t *perm = &name->fcap.permitted;
1305 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted);
1394 audit_log_cap(ab, "fp", &axs->fcap.permitted);
1397 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted);
1400 audit_log_cap(ab, "new_pp", &axs->new_pcap.permitted);
1913 memset(&name->fcap.permitted, 0, sizeof(kernel_cap_t));
1925 name->fcap.permitted = caps.permitted;
2442 ax->fcap.permitted
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/
H A Dcommoncap.c130 * Determine whether the nominated task is permitted to trace the current
151 * @permitted: The place to record the permitted set
157 kernel_cap_t *inheritable, kernel_cap_t *permitted)
166 *permitted = cred->cap_permitted;
173 * permitted set. Returns 1 if they are limited, 0 if they are not.
193 * @permitted: A pointer to the proposed new permitted capabilities set
203 const kernel_cap_t *permitted)
219 if (!cap_issubset(*permitted, ol
156 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
199 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
300 __u32 permitted = caps->permitted.cap[i]; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/build-aux/
H A Dvc-list-files54 There is NO WARRANTY, to the extent permitted by law.
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/proc/
H A Darray.c373 int permitted; local
386 permitted = ptrace_may_access(task, PTRACE_MODE_READ);
390 if (permitted) {
446 if (permitted && (!whole || num_threads < 2))
497 (permitted && mm) ? mm->start_stack : 0,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Doplock_linux.c33 uint32 permitted; member in struct:cap_user_data
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/flac-1.2.1/src/libFLAC/ia32/
H A Dnasm.h5 ; modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/
H A Dadd_cr.pl88 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/
H A Dadd_cr.pl88 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/
H A Dadd_cr.pl88 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bn/
H A Dbn_prime.pl56 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/
H A Dlsm.c116 kernel_cap_t *inheritable, kernel_cap_t *permitted)
127 *permitted = cred->cap_permitted;
131 *permitted = cap_intersect(*permitted, profile->caps.allow);
115 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bn/
H A Dbn_prime.pl56 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bn/
H A Dbn_prime.pl56 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/
H A Dtruntime.tex67 \item the base class name(s) (up to two base classes are permitted);
H A Dcursor.tex113 Under X, the permitted cursor types are:
120 Under Windows, the permitted types are:
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/conf/
H A Dkeysets.pl78 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/m68k/ifpsp060/
H A Dfskeleton.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
H A Diskeleton.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
H A Dos.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/conf/
H A Dkeysets.pl78 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/conf/
H A Dkeysets.pl78 * modification, are permitted provided that the following conditions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/docs_src/tcl/
H A Dm4.tcl132 The m4_db process' environment may be permitted to specify information
140 The m4_db process' environment may be permitted to specify information

Completed in 124 milliseconds

123