| /Linux-v5.4/security/ | 
| D | commoncap.c | 167  * Determine whether the nominated task is permitted to trace the current 194  * @permitted: The place to record the permitted set 200 	       kernel_cap_t *inheritable, kernel_cap_t *permitted)  in cap_capget()  argument 209 	*permitted   = cred->cap_permitted;  in cap_capget() 216  * permitted set.  Returns 1 if they are limited, 0 if they are not. 235  * @permitted: A pointer to the proposed new permitted capabilities set 245 	       const kernel_cap_t *permitted)  in cap_capset()  argument 260 	/* verify restrictions on target's new Permitted set */  in cap_capset() 261 	if (!cap_issubset(*permitted, old->cap_permitted))  in cap_capset() 265 	if (!cap_issubset(*effective, *permitted))  in cap_capset() [all …] 
 | 
| /Linux-v5.4/tools/testing/selftests/bpf/verifier/ | 
| D | perf_event_sample_period.c | 2 	"check bpf_perf_event_data->sample_period byte load permitted", 18 	"check bpf_perf_event_data->sample_period half load permitted", 34 	"check bpf_perf_event_data->sample_period word load permitted", 50 	"check bpf_perf_event_data->sample_period dword load permitted",
  | 
| D | ctx_skb.c | 480 	"__sk_buff->hash, offset 0, byte store not permitted", 491 	"__sk_buff->tc_index, offset 3, byte store not permitted", 502 	"check skb->hash byte load permitted", 517 	"check skb->hash byte load permitted 1", 527 	"check skb->hash byte load permitted 2", 537 	"check skb->hash byte load permitted 3", 624 	"check __sk_buff->hash, offset 0, half store not permitted", 635 	"check __sk_buff->tc_index, offset 2, half store not permitted", 646 	"check skb->hash half load permitted", 661 	"check skb->hash half load permitted 2", [all …] 
 | 
| /Linux-v5.4/kernel/ | 
| D | capability.c | 143  * @dataptr: pointer to struct that contains the effective, permitted, 172 			kdata[i].permitted = pP.cap[i];  in SYSCALL_DEFINE2() 208  * @data: pointer to struct that contains the effective, permitted, 216  * I: any raised capabilities must be a subset of the old permitted 217  * P: any raised capabilities must be a subset of the old permitted 218  * E: must be set to a subset of new permitted 226 	kernel_cap_t inheritable, permitted, effective;  in SYSCALL_DEFINE2()  local 251 		permitted.cap[i] = kdata[i].permitted;  in SYSCALL_DEFINE2() 256 		permitted.cap[i] = 0;  in SYSCALL_DEFINE2() 262 	permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;  in SYSCALL_DEFINE2() [all …] 
 | 
| /Linux-v5.4/drivers/mtd/ | 
| D | Kconfig | 85 	  legal - in the USA you are only permitted to use this on PCMCIA 87 	  permitted to copy, modify and distribute the code as you wish. Just 102 	  legal - in the USA you are only permitted to use this on DiskOnChip 104 	  permitted to copy, modify and distribute the code as you wish. Just 127 	  legal - in the USA you are only permitted to use this on DiskOnChip 129 	  permitted to copy, modify and distribute the code as you wish. Just
  | 
| /Linux-v5.4/Documentation/ABI/testing/ | 
| D | sysfs-driver-hid-picolcd | 10 		Writing: causes operation mode switch. Permitted values are 24 		Reading/Writing: It is expressed in ms and permitted range is 37 		within permitted rates.
  | 
| /Linux-v5.4/include/linux/ | 
| D | capability.h | 31 	kernel_cap_t permitted;  member 182 					    const kernel_cap_t permitted)  in cap_raise_fs_set()  argument 186 			   cap_intersect(permitted, __cap_fs_set));  in cap_raise_fs_set() 196 					      const kernel_cap_t permitted)  in cap_raise_nfsd_set()  argument 200 			   cap_intersect(permitted, __cap_nfsd_set));  in cap_raise_nfsd_set()
  | 
| D | rcu_sync.h | 26  * rcu_sync_is_idle() - Are readers permitted to use their fastpaths? 29  * Returns true if readers are permitted to use their fastpaths.  Must be
  | 
| D | wait_bit.h | 67  * if the process received a signal and the mode permitted wakeup 92  * if the process received a signal and the mode permitted wakeup 119  * received a signal and the mode permitted wakeup on that signal. 146  * if the process received a signal and the mode permitted wakeup
  | 
| /Linux-v5.4/security/safesetid/ | 
| D | lsm.c | 102 	bool permitted;  in uid_permitted_for_cred()  local 113 	permitted =  in uid_permitted_for_cred() 115 	if (!permitted) {  in uid_permitted_for_cred() 120 	return permitted;  in uid_permitted_for_cred()
  | 
| /Linux-v5.4/drivers/scsi/isci/ | 
| D | remote_device.h | 30  * modification, are permitted provided that the following conditions 198  * permitted.  This state is entered from the INITIAL state.  This state 203  * IO operations are permitted.  This state is entered from the STOPPED 249  * permitted, but existing IO operations are allowed to complete.  This 254  * failed.  In this state no new IO operations are permitted.  This 259  * In this state no new IO operations are permitted.  This state is
  | 
| D | host.h | 30  * modification, are permitted provided that the following conditions 234 	 * are permitted. 241 	 * initialized.  In this state no new IO operations are permitted. 248 	 * ready (i.e. starting).  In this state no new IO operations are permitted. 273 	 * In this state no new IO operations are permitted, but existing IO 281 	 * initialized.  In this state no new IO operations are permitted.
  | 
| D | phy.h | 30  * modification, are permitted provided that the following conditions 344  *		     no new IO operations are permitted on this phy. 346  *		      this state no new IO operations are permitted on 371  *		       state no new IO operations are permitted on this
  | 
| D | port.h | 30  * modification, are permitted provided that the following conditions 149  *		      no new IO operations are permitted.  This state is 152  *		       state no new IO operations are permitted, but
  | 
| /Linux-v5.4/Documentation/admin-guide/LSM/ | 
| D | Smack.rst | 95 	label does not allow all of the access permitted to a process 102 	the Smack rule (more below) that permitted the write access 138 	would be permitted. The text will be either "1" indicating 146 	would be permitted. The text will be either "1" indicating 250 	otherwise be permitted, and are intended to provide additional 257 	otherwise be permitted, and are intended to provide additional 313 	the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 	   is permitted. 486 	   is permitted. [all …] 
 | 
| /Linux-v5.4/arch/m68k/fpsp040/ | 
| D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
  | 
| /Linux-v5.4/Documentation/devicetree/bindings/input/touchscreen/ | 
| D | bu21013.txt | 23  - rohm,touch-max-x        : Maximum outward permitted limit in the X axis 24  - rohm,touch-max-y        : Maximum outward permitted limit in the Y axis
  | 
| /Linux-v5.4/include/uapi/linux/ | 
| D | capability.h | 46         __u32 permitted;  member 75 		__le32 permitted;    /* Little endian */  member 86 		__le32 permitted;    /* Little endian */  member 165  *   Transfer any capability in your permitted set to any pid, 166  *   remove any capability in your permitted set from any pid
  | 
| /Linux-v5.4/fs/proc/ | 
| D | array.c | 440 	int permitted;  in do_task_stat()  local 452 	permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT);  in do_task_stat() 465 		if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) {  in do_task_stat() 521 	if (permitted && (!whole || num_threads < 2))  in do_task_stat() 565 	seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0);  in do_task_stat() 566 	seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0);  in do_task_stat() 567 	seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0);  in do_task_stat() 601 	if (mm && permitted) {  in do_task_stat() 612 	if (permitted)  in do_task_stat()
  | 
| /Linux-v5.4/include/uapi/linux/netfilter/ | 
| D | nfnetlink_osf.h | 81 	OSFOPT_SACKP,		/* SACK permitted */ 86 	OSFOPT_POCP,		/* Partial Order Connection Permitted */
  | 
| /Linux-v5.4/drivers/crypto/cavium/zip/ | 
| D | zip_deflate.h | 13  * or without modification, are permitted provided that the following 33  * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
  | 
| D | zip_inflate.h | 13  * or without modification, are permitted provided that the following 33  * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
  | 
| D | zip_mem.h | 13  * or without modification, are permitted provided that the following 33  * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
  | 
| D | zip_crypto.h | 13  * or without modification, are permitted provided that the following 33  * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
  | 
| /Linux-v5.4/arch/m68k/ifpsp060/ | 
| D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
  |