/linux/security/ |
A D | commoncap.c | 209 *permitted = cred->cap_permitted; in cap_capget() 245 const kernel_cap_t *permitted) in cap_capset() argument 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() 270 new->cap_permitted = *permitted; in cap_capset() 277 cap_intersect(*permitted, in cap_capset() 605 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local 613 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps() 616 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps() 709 cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted); in get_vfs_caps_from_disk() 869 __cap_gained(permitted, new, old)) || in nonroot_raised_pE() [all …]
|
/linux/kernel/ |
A D | capability.c | 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
A D | auditsc.c | 1327 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1423 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1693 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1696 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1700 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2214 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2768 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2774 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2779 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2801 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/linux/include/linux/ |
A D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
A D | security.h | 143 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 147 const kernel_cap_t *permitted); 273 kernel_cap_t *permitted); 277 const kernel_cap_t *permitted); 550 kernel_cap_t *permitted) in security_capget() argument 552 return cap_capget(target, effective, inheritable, permitted); in security_capget() 559 const kernel_cap_t *permitted) in security_capset() argument 561 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/linux/include/uapi/linux/ |
A D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/linux/security/safesetid/ |
A D | lsm.c | 155 bool permitted; in id_permitted_for_cred() local 173 permitted = in id_permitted_for_cred() 176 if (!permitted) { in id_permitted_for_cred() 188 return permitted; in id_permitted_for_cred()
|
/linux/arch/x86/kernel/fpu/ |
A D | xstate.c | 1613 if ((permitted & requested) == requested) in __xstate_request_perm() 1617 mask = permitted | requested; in __xstate_request_perm() 1645 u64 permitted, requested; in xstate_request_perm() local 1664 permitted = xstate_get_host_group_perm(); in xstate_request_perm() 1665 if ((permitted & requested) == requested) in xstate_request_perm() 1670 permitted = xstate_get_host_group_perm(); in xstate_request_perm() 1671 ret = __xstate_request_perm(permitted, requested); in xstate_request_perm() 1743 u64 permitted, supported; in fpu_xstate_prctl() local 1759 permitted = xstate_get_host_group_perm(); in fpu_xstate_prctl() 1760 permitted &= XFEATURE_MASK_USER_SUPPORTED; in fpu_xstate_prctl() [all …]
|
/linux/fs/proc/ |
A D | array.c | 462 int permitted; in do_task_stat() local 474 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 487 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 543 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 588 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 589 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 590 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 621 if (mm && permitted) { in do_task_stat() 632 if (permitted) in do_task_stat()
|
/linux/Documentation/devicetree/bindings/input/touchscreen/ |
A D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/linux/drivers/mtd/ |
A D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
/linux/arch/m68k/fpsp040/ |
A D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/linux/Documentation/ABI/testing/ |
A D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
A D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/linux/arch/m68k/ifpsp060/ |
A D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
A D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
A D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/linux/Documentation/admin-guide/LSM/ |
A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. 489 label is permitted. [all …]
|
/linux/Documentation/devicetree/bindings/clock/ |
A D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/linux/arch/arm/boot/dts/ |
A D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
/linux/Documentation/devicetree/bindings/arm/ |
A D | trbe.yaml | 17 if it is permitted to use the component by checking the
|
/linux/tools/testing/selftests/clone3/ |
A D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
/linux/LICENSES/deprecated/ |
A D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
/linux/fs/nfs/ |
A D | nfstrace.h | 171 unsigned int permitted, 175 TP_ARGS(inode, mask, permitted, error), 188 __field(unsigned int, permitted) 203 __entry->permitted = permitted; 223 __entry->mask, __entry->permitted
|
/linux/arch/arm64/boot/dts/amazon/ |
A D | alpine-v2-evp.dts | 13 * without modification, are permitted provided that the following
|