Home
last modified time | relevance | path

Searched refs:permitted (Results 1 – 25 of 445) sorted by relevance

12345678910>>...18

/Linux-v5.4/kernel/
Dcapability.c172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2()
226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2()
256 permitted.cap[i] = 0; in SYSCALL_DEFINE2()
262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
Dauditsc.c1181 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps()
1274 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special()
1489 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit()
1492 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit()
1496 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit()
1909 name->fcap.permitted = caps.permitted; in audit_copy_fcaps()
2458 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps()
2464 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps()
2469 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps()
2490 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
/Linux-v5.4/security/safesetid/
Dlsm.c102 bool permitted; in uid_permitted_for_cred() local
113 permitted = in uid_permitted_for_cred()
115 if (!permitted) { in uid_permitted_for_cred()
120 return permitted; in uid_permitted_for_cred()
/Linux-v5.4/security/
Dcommoncap.c200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
209 *permitted = cred->cap_permitted; in cap_capget()
245 const kernel_cap_t *permitted) in cap_capset() argument
261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
265 if (!cap_issubset(*effective, *permitted)) in cap_capset()
270 new->cap_permitted = *permitted; in cap_capset()
277 cap_intersect(*permitted, in cap_capset()
544 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local
552 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps()
555 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps()
[all …]
/Linux-v5.4/include/uapi/linux/
Dcapability.h46 __u32 permitted; member
75 __le32 permitted; /* Little endian */ member
86 __le32 permitted; /* Little endian */ member
/Linux-v5.4/include/linux/
Dcapability.h31 kernel_cap_t permitted; member
182 const kernel_cap_t permitted) in cap_raise_fs_set() argument
186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set()
196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
Dsecurity.h135 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
139 const kernel_cap_t *permitted);
262 kernel_cap_t *permitted);
266 const kernel_cap_t *permitted);
520 kernel_cap_t *permitted) in security_capget() argument
522 return cap_capget(target, effective, inheritable, permitted); in security_capget()
529 const kernel_cap_t *permitted) in security_capset() argument
531 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
/Linux-v5.4/fs/proc/
Darray.c440 int permitted; in do_task_stat() local
452 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
465 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat()
521 if (permitted && (!whole || num_threads < 2)) in do_task_stat()
565 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat()
566 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat()
567 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat()
601 if (mm && permitted) { in do_task_stat()
612 if (permitted) in do_task_stat()
/Linux-v5.4/Documentation/devicetree/bindings/input/touchscreen/
Dbu21013.txt23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis
24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
/Linux-v5.4/arch/m68k/fpsp040/
DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,
/Linux-v5.4/drivers/mtd/
DKconfig85 legal - in the USA you are only permitted to use this on PCMCIA
87 permitted to copy, modify and distribute the code as you wish. Just
102 legal - in the USA you are only permitted to use this on DiskOnChip
104 permitted to copy, modify and distribute the code as you wish. Just
127 legal - in the USA you are only permitted to use this on DiskOnChip
129 permitted to copy, modify and distribute the code as you wish. Just
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-driver-hid-picolcd24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
Dsysfs-driver-hid-logitech-hidpp6 (RW) This attribute controls the amount of 'turn' permitted in
/Linux-v5.4/arch/m68k/ifpsp060/
DREADME10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DMISC10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DCHANGES10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
/Linux-v5.4/Documentation/devicetree/bindings/clock/
Dbrcm,bcm2835-aux-clock.txt12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
Dbrcm,bcm2835-cprman.txt18 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
/Linux-v5.4/arch/arm/boot/dts/
Dalpine-db.dts9 * without modification, are permitted provided that the following conditions
Dbcm94709.dts7 * modification, are permitted provided that the following conditions
Dbcm94708.dts7 * modification, are permitted provided that the following conditions
Dbcm9hmidc.dtsi7 * modification, are permitted provided that the following conditions
/Linux-v5.4/Documentation/admin-guide/LSM/
DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/Linux-v5.4/LICENSES/deprecated/
DLinux-OpenIB11 modification, are permitted provided that the following conditions are met:
/Linux-v5.4/LICENSES/preferred/
DBSD-2-Clause13 modification, are permitted provided that the following conditions are met:

12345678910>>...18