Home
last modified time | relevance | path

Searched refs:permitted (Results 1 – 25 of 462) sorted by relevance

12345678910>>...19

/Linux-v6.6/kernel/
Dcapability.c169 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2()
224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
248 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2()
256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
Dauditsc.c1315 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps()
1458 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special()
1733 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit()
1736 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit()
1740 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit()
2260 name->fcap.permitted = caps.permitted; in audit_copy_fcaps()
2816 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps()
2822 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps()
2827 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps()
2849 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
/Linux-v6.6/security/
Dcommoncap.c201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
210 *permitted = cred->cap_permitted; in cap_capget()
246 const kernel_cap_t *permitted) in cap_capset() argument
262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
266 if (!cap_issubset(*effective, *permitted)) in cap_capset()
271 new->cap_permitted = *permitted; in cap_capset()
278 cap_intersect(*permitted, in cap_capset()
605 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps()
608 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps()
698 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk()
[all …]
/Linux-v6.6/include/linux/
Dcapability.h30 kernel_cap_t permitted; member
125 const kernel_cap_t permitted) in cap_raise_fs_set() argument
127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set()
136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
Dsecurity.h149 kernel_cap_t *inheritable, kernel_cap_t *permitted);
153 const kernel_cap_t *permitted);
278 kernel_cap_t *permitted);
282 const kernel_cap_t *permitted);
561 kernel_cap_t *permitted) in security_capget() argument
563 return cap_capget(target, effective, inheritable, permitted); in security_capget()
570 const kernel_cap_t *permitted) in security_capset() argument
572 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
/Linux-v6.6/include/uapi/linux/
Dcapability.h46 __u32 permitted; member
76 __le32 permitted; /* Little endian */ member
87 __le32 permitted; /* Little endian */ member
/Linux-v6.6/arch/x86/kernel/fpu/
Dxstate.c1585 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument
1601 if ((permitted & requested) == requested) in __xstate_request_perm()
1605 mask = permitted | requested; in __xstate_request_perm()
1639 u64 permitted, requested; in xstate_request_perm() local
1658 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1659 if ((permitted & requested) == requested) in xstate_request_perm()
1664 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1667 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm()
1670 ret = __xstate_request_perm(permitted, requested, guest); in xstate_request_perm()
1758 u64 permitted, supported; in fpu_xstate_prctl() local
[all …]
/Linux-v6.6/security/safesetid/
Dlsm.c149 bool permitted; in id_permitted_for_cred() local
167 permitted = in id_permitted_for_cred()
170 if (!permitted) { in id_permitted_for_cred()
182 return permitted; in id_permitted_for_cred()
/Linux-v6.6/fs/proc/
Darray.c477 int permitted; in do_task_stat() local
490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
503 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat()
562 if (permitted && (!whole || num_threads < 2)) in do_task_stat()
607 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat()
608 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat()
609 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat()
640 if (mm && permitted) { in do_task_stat()
651 if (permitted) in do_task_stat()
/Linux-v6.6/Documentation/devicetree/bindings/input/touchscreen/
Dbu21013.txt23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis
24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
/Linux-v6.6/arch/m68k/fpsp040/
DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,
/Linux-v6.6/drivers/mtd/
DKconfig87 legal - in the USA you are only permitted to use this on PCMCIA
89 permitted to copy, modify and distribute the code as you wish. Just
104 legal - in the USA you are only permitted to use this on DiskOnChip
106 permitted to copy, modify and distribute the code as you wish. Just
129 legal - in the USA you are only permitted to use this on DiskOnChip
131 permitted to copy, modify and distribute the code as you wish. Just
/Linux-v6.6/Documentation/ABI/testing/
Dsysfs-driver-hid-picolcd24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
Dsysfs-bus-event_source-devices-hv_gpci107 * "-EPERM" : Partition is not permitted to retrieve performance information,
139 * "-EPERM" : Partition is not permitted to retrieve performance information,
171 * "-EPERM" : Partition is not permitted to retrieve performance information,
203 * "-EPERM" : Partition is not permitted to retrieve performance information,
235 * "-EPERM" : Partition is not permitted to retrieve performance information,
Dsysfs-driver-hid-logitech-hidpp6 (RW) This attribute controls the amount of 'turn' permitted in
/Linux-v6.6/arch/m68k/ifpsp060/
DREADME10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DMISC10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
DCHANGES10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
/Linux-v6.6/Documentation/devicetree/bindings/clock/
Dbrcm,bcm2835-aux-clock.txt12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
/Linux-v6.6/arch/arm/boot/dts/amazon/
Dalpine-db.dts9 * without modification, are permitted provided that the following conditions
/Linux-v6.6/Documentation/admin-guide/LSM/
DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/Linux-v6.6/LICENSES/deprecated/
DLinux-OpenIB11 modification, are permitted provided that the following conditions are met:
/Linux-v6.6/tools/testing/selftests/clone3/
Dclone3_cap_checkpoint_restore.c125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
/Linux-v6.6/arch/arm64/boot/dts/amazon/
Dalpine-v2-evp.dts13 * without modification, are permitted provided that the following
/Linux-v6.6/arch/arm64/boot/dts/broadcom/stingray/
Dbcm958742t.dts7 * modification, are permitted provided that the following conditions

12345678910>>...19