Searched refs:permitted (Results 1 - 25 of 37) sorted by relevance

12

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/kernel/
H A Dcapability.c39 * @dataptr: pointer to struct that contains the effective, permitted,
79 ret = security_capget(target, &data.effective, &data.inheritable, &data.permitted);
97 kernel_cap_t *permitted)
110 permitted)) {
113 permitted);
131 kernel_cap_t *permitted)
142 permitted))
145 security_capset_set(target, effective, inheritable, permitted);
157 * @data: pointer to struct that contains the effective, permitted,
167 * I: any raised capabilities must be a subset of the (old current) permitted
95 cap_set_pg(int pgrp_nr, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
129 cap_set_all(kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
175 kernel_cap_t inheritable, permitted, effective; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/
H A Dcommoncap.c68 kernel_cap_t *inheritable, kernel_cap_t *permitted)
73 *permitted = cap_t (target->cap_permitted);
78 kernel_cap_t *inheritable, kernel_cap_t *permitted)
89 if (!cap_issubset (*permitted,
96 if (!cap_issubset (*effective, *permitted)) {
104 kernel_cap_t *inheritable, kernel_cap_t *permitted)
108 target->cap_permitted = *permitted;
125 * and permitted sets of the executable file.
214 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
218 * {r,e,s}uid != 0, the permitted an
67 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
77 cap_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
103 cap_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
[all...]
H A Ddummy.c38 kernel_cap_t * inheritable, kernel_cap_t * permitted)
40 *effective = *inheritable = *permitted = 0;
43 *permitted |= (~0 & ~CAP_FS_MASK);
47 *permitted |= CAP_FS_MASK;
57 kernel_cap_t * permitted)
65 kernel_cap_t * permitted)
37 dummy_capget(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument
54 dummy_capset_check(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument
62 dummy_capset_set(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/
H A Dsecurity.h46 extern int cap_capget (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
47 extern int cap_capset_check (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
48 extern void cap_capset_set (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
622 * from the kernel and should typically be permitted.
1063 * Get the @effective, @inheritable, and @permitted capability sets for
1070 * @permitted contains the permitted capability set.
1074 * @permitted capability sets for the @target process.
1082 * @permitted contains the permitted capabilit
1410 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1418 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1426 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
2155 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
2163 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
2171 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
[all...]
H A Dcapability.h36 __u32 permitted; member in struct:__user_cap_data_struct
128 /* Transfer any capability in your permitted set to any pid,
129 remove any capability in your permitted set from any pid */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/flac-1.2.1/src/libFLAC/ia32/
H A Dnasm.h5 ; modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/
H A Doplock_linux.c78 uint32 permitted; member in struct:__anon1738
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/util/
H A Dadd_cr.pl88 * modification, are permitted provided that the following conditions
H A Dmkerr.pl269 " * modification, are permitted provided that the following conditions\n",
411 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/bn/
H A Dbn_prime.pl56 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/bn/
H A Dbn_prime.pl56 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/util/
H A Dadd_cr.pl88 * modification, are permitted provided that the following conditions
H A Dmkerr.pl318 " * modification, are permitted provided that the following conditions\n",
492 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/conf/
H A Dkeysets.pl78 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/conf/
H A Dkeysets.pl78 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/m68k/ifpsp060/
H A Dfskeleton.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
H A Diskeleton.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
H A Dos.S10 |To the maximum extent permitted by applicable law,
16 |To the maximum extent permitted by applicable law,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/
H A Dsmbldap-passwd326 The user is first prompted for their old password, if one is present. This password is then tested against the stored password by binding to the server. The user has only one chance to enter the correct passwword. The super user is permitted to bypass this step so that forgotten passwords may be changed.
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/docs_src/tcl/
H A Dm4.tcl132 The m4_db process' environment may be permitted to specify information
140 The m4_db process' environment may be permitted to specify information
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/arm/mach-omap1/
H A Dboard-h3.c301 #error this is not permitted - mode is an argument variable
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/objects/
H A Dobj_dat.pl200 * modification, are permitted provided that the following conditions
H A Dobjects.pl148 * modification, are permitted provided that the following conditions
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/objects/
H A Dobj_dat.pl200 * modification, are permitted provided that the following conditions
H A Dobjects.pl148 * modification, are permitted provided that the following conditions

Completed in 211 milliseconds

12