/Linux-v5.10/kernel/ |
D | capability.c | 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1210 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1303 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1518 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1521 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1525 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 1951 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2500 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2506 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2511 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2532 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/Linux-v5.10/security/ |
D | commoncap.c | 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *permitted = cred->cap_permitted; in cap_capget() 245 const kernel_cap_t *permitted) in cap_capset() argument 261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() 270 new->cap_permitted = *permitted; in cap_capset() 277 cap_intersect(*permitted, in cap_capset() 544 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local 552 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps() 555 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps() [all …]
|
/Linux-v5.10/include/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/Linux-v5.10/include/linux/ |
D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
D | security.h | 141 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 145 const kernel_cap_t *permitted); 268 kernel_cap_t *permitted); 272 const kernel_cap_t *permitted); 533 kernel_cap_t *permitted) in security_capget() argument 535 return cap_capget(target, effective, inheritable, permitted); in security_capget() 542 const kernel_cap_t *permitted) in security_capset() argument 544 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/Linux-v5.10/security/safesetid/ |
D | lsm.c | 158 bool permitted; in id_permitted_for_cred() local 176 permitted = in id_permitted_for_cred() 179 if (!permitted) { in id_permitted_for_cred() 191 return permitted; in id_permitted_for_cred()
|
/Linux-v5.10/fs/proc/ |
D | array.c | 441 int permitted; in do_task_stat() local 453 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 466 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 522 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 566 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 567 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 568 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 602 if (mm && permitted) { in do_task_stat() 613 if (permitted) in do_task_stat()
|
/Linux-v5.10/Documentation/devicetree/bindings/input/touchscreen/ |
D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/Linux-v5.10/arch/m68k/fpsp040/ |
D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/Linux-v5.10/drivers/mtd/ |
D | Kconfig | 85 legal - in the USA you are only permitted to use this on PCMCIA 87 permitted to copy, modify and distribute the code as you wish. Just 102 legal - in the USA you are only permitted to use this on DiskOnChip 104 permitted to copy, modify and distribute the code as you wish. Just 127 legal - in the USA you are only permitted to use this on DiskOnChip 129 permitted to copy, modify and distribute the code as you wish. Just
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/Linux-v5.10/arch/m68k/ifpsp060/ |
D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/Linux-v5.10/Documentation/devicetree/bindings/clock/ |
D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
D | brcm,bcm2835-cprman.txt | 18 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/Linux-v5.10/arch/arm/boot/dts/ |
D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
/Linux-v5.10/Documentation/admin-guide/LSM/ |
D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
/Linux-v5.10/Documentation/networking/devlink/ |
D | sja1105.rst | 47 number of permitted VLANs may be less than 7 per
|
/Linux-v5.10/tools/testing/selftests/clone3/ |
D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
/Linux-v5.10/LICENSES/deprecated/ |
D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
/Linux-v5.10/arch/arm64/boot/dts/amazon/ |
D | alpine-v2-evp.dts | 13 * without modification, are permitted provided that the following
|
/Linux-v5.10/arch/arm64/boot/dts/broadcom/stingray/ |
D | bcm958742t.dts | 7 * modification, are permitted provided that the following conditions
|