/Linux-v5.4/kernel/ |
D | capability.c | 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1181 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1274 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1489 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1492 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1496 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 1909 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2458 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2464 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2469 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2490 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/Linux-v5.4/security/safesetid/ |
D | lsm.c | 102 bool permitted; in uid_permitted_for_cred() local 113 permitted = in uid_permitted_for_cred() 115 if (!permitted) { in uid_permitted_for_cred() 120 return permitted; in uid_permitted_for_cred()
|
/Linux-v5.4/security/ |
D | commoncap.c | 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *permitted = cred->cap_permitted; in cap_capget() 245 const kernel_cap_t *permitted) in cap_capset() argument 261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() 270 new->cap_permitted = *permitted; in cap_capset() 277 cap_intersect(*permitted, in cap_capset() 544 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local 552 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps() 555 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps() [all …]
|
/Linux-v5.4/include/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/Linux-v5.4/include/linux/ |
D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
D | security.h | 135 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 139 const kernel_cap_t *permitted); 262 kernel_cap_t *permitted); 266 const kernel_cap_t *permitted); 520 kernel_cap_t *permitted) in security_capget() argument 522 return cap_capget(target, effective, inheritable, permitted); in security_capget() 529 const kernel_cap_t *permitted) in security_capset() argument 531 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/Linux-v5.4/fs/proc/ |
D | array.c | 440 int permitted; in do_task_stat() local 452 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 465 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 521 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 565 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 566 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 567 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 601 if (mm && permitted) { in do_task_stat() 612 if (permitted) in do_task_stat()
|
/Linux-v5.4/Documentation/devicetree/bindings/input/touchscreen/ |
D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/Linux-v5.4/arch/m68k/fpsp040/ |
D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/Linux-v5.4/drivers/mtd/ |
D | Kconfig | 85 legal - in the USA you are only permitted to use this on PCMCIA 87 permitted to copy, modify and distribute the code as you wish. Just 102 legal - in the USA you are only permitted to use this on DiskOnChip 104 permitted to copy, modify and distribute the code as you wish. Just 127 legal - in the USA you are only permitted to use this on DiskOnChip 129 permitted to copy, modify and distribute the code as you wish. Just
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/Linux-v5.4/arch/m68k/ifpsp060/ |
D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/Linux-v5.4/Documentation/devicetree/bindings/clock/ |
D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
D | brcm,bcm2835-cprman.txt | 18 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/Linux-v5.4/arch/arm/boot/dts/ |
D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
D | bcm94709.dts | 7 * modification, are permitted provided that the following conditions
|
D | bcm94708.dts | 7 * modification, are permitted provided that the following conditions
|
D | bcm9hmidc.dtsi | 7 * modification, are permitted provided that the following conditions
|
/Linux-v5.4/Documentation/admin-guide/LSM/ |
D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
/Linux-v5.4/LICENSES/deprecated/ |
D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
/Linux-v5.4/LICENSES/preferred/ |
D | BSD-2-Clause | 13 modification, are permitted provided that the following conditions are met:
|