| /Linux-v5.15/security/ |
| D | commoncap.c | 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *permitted = cred->cap_permitted; in cap_capget() 245 const kernel_cap_t *permitted) in cap_capset() argument 261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() 270 new->cap_permitted = *permitted; in cap_capset() 277 cap_intersect(*permitted, in cap_capset() 605 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local 613 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps() 616 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps() [all …]
|
| /Linux-v5.15/kernel/ |
| D | capability.c | 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
| D | auditsc.c | 1215 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1311 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1528 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1531 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1535 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 1948 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2502 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2508 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2513 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2535 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
| /Linux-v5.15/include/uapi/linux/ |
| D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
| /Linux-v5.15/include/linux/ |
| D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
| D | security.h | 143 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 147 const kernel_cap_t *permitted); 273 kernel_cap_t *permitted); 277 const kernel_cap_t *permitted); 549 kernel_cap_t *permitted) in security_capget() argument 551 return cap_capget(target, effective, inheritable, permitted); in security_capget() 558 const kernel_cap_t *permitted) in security_capset() argument 560 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
| /Linux-v5.15/security/safesetid/ |
| D | lsm.c | 155 bool permitted; in id_permitted_for_cred() local 173 permitted = in id_permitted_for_cred() 176 if (!permitted) { in id_permitted_for_cred() 188 return permitted; in id_permitted_for_cred()
|
| /Linux-v5.15/fs/proc/ |
| D | array.c | 462 int permitted; in do_task_stat() local 474 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 487 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 543 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 588 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 589 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 590 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 624 if (mm && permitted) { in do_task_stat() 635 if (permitted) in do_task_stat()
|
| /Linux-v5.15/Documentation/devicetree/bindings/input/touchscreen/ |
| D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
| /Linux-v5.15/arch/m68k/fpsp040/ |
| D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
| /Linux-v5.15/drivers/mtd/ |
| D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
| D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
| /Linux-v5.15/arch/m68k/ifpsp060/ |
| D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| /Linux-v5.15/Documentation/devicetree/bindings/clock/ |
| D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
| /Linux-v5.15/arch/arm/boot/dts/ |
| D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
| D | bcm9hmidc.dtsi | 7 * modification, are permitted provided that the following conditions
|
| /Linux-v5.15/Documentation/admin-guide/LSM/ |
| D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
| /Linux-v5.15/tools/testing/selftests/clone3/ |
| D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
| /Linux-v5.15/LICENSES/deprecated/ |
| D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
| /Linux-v5.15/arch/arm64/boot/dts/broadcom/stingray/ |
| D | bcm958742t.dts | 7 * modification, are permitted provided that the following conditions
|
| /Linux-v5.15/arch/arm64/boot/dts/amazon/ |
| D | alpine-v2-evp.dts | 13 * without modification, are permitted provided that the following
|
| /Linux-v5.15/LICENSES/preferred/ |
| D | BSD-2-Clause | 13 modification, are permitted provided that the following conditions are met:
|