/Linux-v6.6/security/ |
D | commoncap.c | 168 * Determine whether the nominated task is permitted to trace the current 195 * @permitted: The place to record the permitted set 201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 210 *permitted = cred->cap_permitted; in cap_capget() 217 * permitted set. Returns 1 if they are limited, 0 if they are not. 236 * @permitted: A pointer to the proposed new permitted capabilities set 246 const kernel_cap_t *permitted) in cap_capset() argument 261 /* verify restrictions on target's new Permitted set */ in cap_capset() 262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 266 if (!cap_issubset(*effective, *permitted)) in cap_capset() [all …]
|
/Linux-v6.6/tools/testing/selftests/powerpc/syscalls/ |
D | rtas_filter.c | 165 printf("Test a permitted call, no parameters... "); in test() 187 // Test a permitted call, user-supplied size, buffer inside RMO in test() 189 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test() 195 // Test a permitted call, user-supplied size, buffer start outside RMO in test() 197 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test() 203 // Test a permitted call, user-supplied size, buffer end outside RMO in test() 205 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test() 211 // Test a permitted call, fixed size, buffer end outside RMO in test() 213 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
|
/Linux-v6.6/tools/testing/selftests/bpf/verifier/ |
D | perf_event_sample_period.c | 2 "check bpf_perf_event_data->sample_period byte load permitted", 18 "check bpf_perf_event_data->sample_period half load permitted", 34 "check bpf_perf_event_data->sample_period word load permitted", 50 "check bpf_perf_event_data->sample_period dword load permitted",
|
D | ctx_skb.c | 480 "__sk_buff->hash, offset 0, byte store not permitted", 491 "__sk_buff->tc_index, offset 3, byte store not permitted", 502 "check skb->hash byte load permitted", 517 "check skb->hash byte load permitted 1", 527 "check skb->hash byte load permitted 2", 537 "check skb->hash byte load permitted 3", 624 "check __sk_buff->hash, offset 0, half store not permitted", 635 "check __sk_buff->tc_index, offset 2, half store not permitted", 646 "check skb->hash half load permitted", 661 "check skb->hash half load permitted 2", [all …]
|
/Linux-v6.6/kernel/ |
D | capability.c | 136 * @dataptr: pointer to struct that contains the effective, permitted, 169 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2() 206 * @data: pointer to struct that contains the effective, permitted, 214 * I: any raised capabilities must be a subset of the old permitted 215 * P: any raised capabilities must be a subset of the old permitted 216 * E: must be set to a subset of new permitted 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 248 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2() 256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
/Linux-v6.6/drivers/mtd/ |
D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
/Linux-v6.6/include/linux/ |
D | capability.h | 30 kernel_cap_t permitted; member 125 const kernel_cap_t permitted) in cap_raise_fs_set() argument 127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set() 136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
|
D | rcu_sync.h | 26 * rcu_sync_is_idle() - Are readers permitted to use their fastpaths? 29 * Returns true if readers are permitted to use their fastpaths. Must be
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | sysfs-driver-hid-picolcd | 10 Writing: causes operation mode switch. Permitted values are 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
D | sysfs-bus-event_source-devices-hv_gpci | 107 * "-EPERM" : Partition is not permitted to retrieve performance information, 139 * "-EPERM" : Partition is not permitted to retrieve performance information, 171 * "-EPERM" : Partition is not permitted to retrieve performance information, 203 * "-EPERM" : Partition is not permitted to retrieve performance information, 235 * "-EPERM" : Partition is not permitted to retrieve performance information,
|
/Linux-v6.6/Documentation/admin-guide/LSM/ |
D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
/Linux-v6.6/drivers/scsi/isci/ |
D | remote_device.h | 30 * modification, are permitted provided that the following conditions 198 * permitted. This state is entered from the INITIAL state. This state 203 * IO operations are permitted. This state is entered from the STOPPED 249 * permitted, but existing IO operations are allowed to complete. This 254 * failed. In this state no new IO operations are permitted. This 259 * In this state no new IO operations are permitted. This state is
|
D | host.h | 30 * modification, are permitted provided that the following conditions 234 * are permitted. 241 * initialized. In this state no new IO operations are permitted. 248 * ready (i.e. starting). In this state no new IO operations are permitted. 273 * In this state no new IO operations are permitted, but existing IO 281 * initialized. In this state no new IO operations are permitted.
|
/Linux-v6.6/arch/m68k/fpsp040/ |
D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/Linux-v6.6/arch/x86/kernel/fpu/ |
D | xstate.c | 1585 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument 1601 if ((permitted & requested) == requested) in __xstate_request_perm() 1605 mask = permitted | requested; in __xstate_request_perm() 1639 u64 permitted, requested; in xstate_request_perm() local 1658 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1659 if ((permitted & requested) == requested) in xstate_request_perm() 1664 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1667 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm() 1670 ret = __xstate_request_perm(permitted, requested, guest); in xstate_request_perm() 1691 /* If not permitted let it die */ in __xfd_enable_feature() [all …]
|
/Linux-v6.6/Documentation/devicetree/bindings/input/touchscreen/ |
D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/Linux-v6.6/include/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 76 __le32 permitted; /* Little endian */ member 87 __le32 permitted; /* Little endian */ member 166 * Transfer any capability in your permitted set to any pid, 167 * remove any capability in your permitted set from any pid
|
/Linux-v6.6/security/safesetid/ |
D | lsm.c | 149 bool permitted; in id_permitted_for_cred() local 167 permitted = in id_permitted_for_cred() 170 if (!permitted) { in id_permitted_for_cred() 182 return permitted; in id_permitted_for_cred()
|
/Linux-v6.6/fs/proc/ |
D | array.c | 477 int permitted; in do_task_stat() local 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 503 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 562 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 607 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 608 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 609 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 640 if (mm && permitted) { in do_task_stat() 651 if (permitted) in do_task_stat()
|
/Linux-v6.6/include/uapi/linux/netfilter/ |
D | nfnetlink_osf.h | 81 OSFOPT_SACKP, /* SACK permitted */ 86 OSFOPT_POCP, /* Partial Order Connection Permitted */
|
/Linux-v6.6/drivers/gpu/drm/i915/gt/ |
D | intel_rps_types.h | 86 u8 min_freq_softlimit; /* Minimum frequency permitted by the driver */ 87 u8 max_freq_softlimit; /* Max frequency permitted by the driver */
|
/Linux-v6.6/drivers/crypto/cavium/zip/ |
D | zip_deflate.h | 13 * or without modification, are permitted provided that the following 33 * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
|
D | zip_inflate.h | 13 * or without modification, are permitted provided that the following 33 * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
|
D | zip_mem.h | 13 * or without modification, are permitted provided that the following 33 * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
|
/Linux-v6.6/arch/m68k/ifpsp060/ |
D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|