/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | capability.h | 47 __u32 permitted; member in struct:__user_cap_data_struct 72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon17246 101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data 171 * Transfer any capability in your permitted set to any pid, 172 * remove any capability in your permitted set from any pid 509 const kernel_cap_t permitted) 513 cap_intersect(permitted, __cap_fs_set)); 523 const kernel_cap_t permitted) 527 cap_intersect(permitted, __cap_nfsd_set)); 508 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument 522 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
|
H A D | security.h | 59 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 63 const kernel_cap_t *permitted); 747 * from the kernel and should typically be permitted. 1230 * Get the @effective, @inheritable, and @permitted capability sets for 1237 * @permitted contains the permitted capability set. 1240 * Set the @effective, @inheritable, and @permitted capability sets for 1246 * @permitted contains the permitted capability set. 1370 kernel_cap_t *inheritable, kernel_cap_t *permitted); 1833 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1841 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | capability.c | 156 * @dataptr: pointer to struct that contains the effective, permitted, 185 kdata[i].permitted = pP.cap[i]; 221 * @data: pointer to struct that contains the effective, permitted, 229 * I: any raised capabilities must be a subset of the old permitted 230 * P: any raised capabilities must be a subset of the old permitted 231 * E: must be set to a subset of new permitted 239 kernel_cap_t inheritable, permitted, effective; local 264 permitted.cap[i] = kdata[i].permitted; 269 permitted [all...] |
H A D | auditsc.c | 90 kernel_cap_t permitted; member in struct:audit_cap_data 1204 kernel_cap_t *perm = &name->fcap.permitted; 1305 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); 1394 audit_log_cap(ab, "fp", &axs->fcap.permitted); 1397 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); 1400 audit_log_cap(ab, "new_pp", &axs->new_pcap.permitted); 1913 memset(&name->fcap.permitted, 0, sizeof(kernel_cap_t)); 1925 name->fcap.permitted = caps.permitted; 2442 ax->fcap.permitted [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/ |
H A D | commoncap.c | 130 * Determine whether the nominated task is permitted to trace the current 151 * @permitted: The place to record the permitted set 157 kernel_cap_t *inheritable, kernel_cap_t *permitted) 166 *permitted = cred->cap_permitted; 173 * permitted set. Returns 1 if they are limited, 0 if they are not. 193 * @permitted: A pointer to the proposed new permitted capabilities set 203 const kernel_cap_t *permitted) 219 if (!cap_issubset(*permitted, ol 156 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 199 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument 300 __u32 permitted = caps->permitted.cap[i]; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/build-aux/ |
H A D | vc-list-files | 54 There is NO WARRANTY, to the extent permitted by law.
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/proc/ |
H A D | array.c | 373 int permitted; local 386 permitted = ptrace_may_access(task, PTRACE_MODE_READ); 390 if (permitted) { 446 if (permitted && (!whole || num_threads < 2)) 497 (permitted && mm) ? mm->start_stack : 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | oplock_linux.c | 33 uint32 permitted; member in struct:cap_user_data
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/flac-1.2.1/src/libFLAC/ia32/ |
H A D | nasm.h | 5 ; modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/ |
H A D | add_cr.pl | 88 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | add_cr.pl | 88 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/ |
H A D | add_cr.pl | 88 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/ |
H A D | lsm.c | 116 kernel_cap_t *inheritable, kernel_cap_t *permitted) 127 *permitted = cred->cap_permitted; 131 *permitted = cap_intersect(*permitted, profile->caps.allow); 115 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/ |
H A D | truntime.tex | 67 \item the base class name(s) (up to two base classes are permitted);
|
H A D | cursor.tex | 113 Under X, the permitted cursor types are: 120 Under Windows, the permitted types are:
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/m68k/ifpsp060/ |
H A D | fskeleton.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
H A D | iskeleton.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
H A D | os.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/docs_src/tcl/ |
H A D | m4.tcl | 132 The m4_db process' environment may be permitted to specify information 140 The m4_db process' environment may be permitted to specify information
|