Home
last modified time | relevance | path

Searched refs:permitted (Results 1 – 25 of 456) sorted by relevance

12345678910>>...19

/Linux-v6.1/security/
Dcommoncap.c201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
210 *permitted = cred->cap_permitted; in cap_capget()
246 const kernel_cap_t *permitted) in cap_capset() argument
262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
266 if (!cap_issubset(*effective, *permitted)) in cap_capset()
271 new->cap_permitted = *permitted; in cap_capset()
278 cap_intersect(*permitted, in cap_capset()
610 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local
618 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps()
621 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps()
[all …]
/Linux-v6.1/kernel/
Dcapability.c172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2()
226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2()
256 permitted.cap[i] = 0; in SYSCALL_DEFINE2()
262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
Dauditsc.c1311 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps()
1454 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special()
1729 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit()
1732 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit()
1736 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit()
2256 name->fcap.permitted = caps.permitted; in audit_copy_fcaps()
2810 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps()
2816 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps()
2821 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps()
2843 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
/Linux-v6.1/include/uapi/linux/
Dcapability.h46 __u32 permitted; member
75 __le32 permitted; /* Little endian */ member
86 __le32 permitted; /* Little endian */ member
/Linux-v6.1/include/linux/
Dcapability.h31 kernel_cap_t permitted; member
182 const kernel_cap_t permitted) in cap_raise_fs_set() argument
186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set()
196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
Dsecurity.h147 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
151 const kernel_cap_t *permitted);
277 kernel_cap_t *permitted);
281 const kernel_cap_t *permitted);
555 kernel_cap_t *permitted) in security_capget() argument
557 return cap_capget(target, effective, inheritable, permitted); in security_capget()
564 const kernel_cap_t *permitted) in security_capset() argument
566 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
/Linux-v6.1/arch/x86/kernel/fpu/
Dxstate.c1542 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument
1558 if ((permitted & requested) == requested) in __xstate_request_perm()
1562 mask = permitted | requested; in __xstate_request_perm()
1596 u64 permitted, requested; in xstate_request_perm() local
1615 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1616 if ((permitted & requested) == requested) in xstate_request_perm()
1621 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1624 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm()
1627 ret = __xstate_request_perm(permitted, requested, guest); in xstate_request_perm()
1715 u64 permitted, supported; in fpu_xstate_prctl() local
[all …]
/Linux-v6.1/security/safesetid/
Dlsm.c149 bool permitted; in id_permitted_for_cred() local
167 permitted = in id_permitted_for_cred()
170 if (!permitted) { in id_permitted_for_cred()
182 return permitted; in id_permitted_for_cred()
/Linux-v6.1/fs/proc/
Darray.c467 int permitted; in do_task_stat() local
480 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
493 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat()
552 if (permitted && (!whole || num_threads < 2)) in do_task_stat()
597 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat()
598 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat()
599 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat()
630 if (mm && permitted) { in do_task_stat()
641 if (permitted) in do_task_stat()
/Linux-v6.1/Documentation/devicetree/bindings/input/touchscreen/
Dbu21013.txt23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis
24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
/Linux-v6.1/arch/m68k/fpsp040/
DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,
/Linux-v6.1/drivers/mtd/
DKconfig87 legal - in the USA you are only permitted to use this on PCMCIA
89 permitted to copy, modify and distribute the code as you wish. Just
104 legal - in the USA you are only permitted to use this on DiskOnChip
106 permitted to copy, modify and distribute the code as you wish. Just
129 legal - in the USA you are only permitted to use this on DiskOnChip
131 permitted to copy, modify and distribute the code as you wish. Just
/Linux-v6.1/Documentation/ABI/testing/
Dsysfs-driver-hid-picolcd24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
Dsysfs-driver-hid-logitech-hidpp6 (RW) This attribute controls the amount of 'turn' permitted in
/Linux-v6.1/arch/m68k/ifpsp060/
DREADME10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DMISC10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DCHANGES10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
/Linux-v6.1/Documentation/devicetree/bindings/clock/
Dbrcm,bcm2835-aux-clock.txt12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
Dbrcm,bcm2835-cprman.txt18 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
/Linux-v6.1/arch/arm/boot/dts/
Dalpine-db.dts9 * without modification, are permitted provided that the following conditions
Dbcm94708.dts7 * modification, are permitted provided that the following conditions
Dbcm94709.dts7 * modification, are permitted provided that the following conditions
/Linux-v6.1/Documentation/admin-guide/LSM/
DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/Linux-v6.1/tools/testing/selftests/clone3/
Dclone3_cap_checkpoint_restore.c125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
/Linux-v6.1/LICENSES/deprecated/
DLinux-OpenIB11 modification, are permitted provided that the following conditions are met:

12345678910>>...19