/linux-6.6.21/kernel/ |
D | capability.c | 169 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2() 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 248 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2() 256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1315 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1458 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1733 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1736 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1740 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2260 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2816 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2822 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2827 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2849 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/linux-6.6.21/security/ |
D | commoncap.c | 201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 210 *permitted = cred->cap_permitted; in cap_capget() 246 const kernel_cap_t *permitted) in cap_capset() argument 262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 266 if (!cap_issubset(*effective, *permitted)) in cap_capset() 271 new->cap_permitted = *permitted; in cap_capset() 278 cap_intersect(*permitted, in cap_capset() 605 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 608 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps() 698 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() [all …]
|
/linux-6.6.21/include/linux/ |
D | capability.h | 30 kernel_cap_t permitted; member 125 const kernel_cap_t permitted) in cap_raise_fs_set() argument 127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set() 136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
|
D | security.h | 149 kernel_cap_t *inheritable, kernel_cap_t *permitted); 153 const kernel_cap_t *permitted); 278 kernel_cap_t *permitted); 282 const kernel_cap_t *permitted); 563 kernel_cap_t *permitted) in security_capget() argument 565 return cap_capget(target, effective, inheritable, permitted); in security_capget() 572 const kernel_cap_t *permitted) in security_capset() argument 574 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/linux-6.6.21/include/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 76 __le32 permitted; /* Little endian */ member 87 __le32 permitted; /* Little endian */ member
|
/linux-6.6.21/arch/x86/kernel/fpu/ |
D | xstate.c | 1585 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument 1601 if ((permitted & requested) == requested) in __xstate_request_perm() 1605 mask = permitted | requested; in __xstate_request_perm() 1639 u64 permitted, requested; in xstate_request_perm() local 1658 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1659 if ((permitted & requested) == requested) in xstate_request_perm() 1664 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1667 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm() 1670 ret = __xstate_request_perm(permitted, requested, guest); in xstate_request_perm() 1758 u64 permitted, supported; in fpu_xstate_prctl() local [all …]
|
/linux-6.6.21/security/safesetid/ |
D | lsm.c | 149 bool permitted; in id_permitted_for_cred() local 167 permitted = in id_permitted_for_cred() 170 if (!permitted) { in id_permitted_for_cred() 182 return permitted; in id_permitted_for_cred()
|
/linux-6.6.21/fs/proc/ |
D | array.c | 477 int permitted; in do_task_stat() local 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 503 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 561 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 609 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 610 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 611 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 642 if (mm && permitted) { in do_task_stat() 653 if (permitted) in do_task_stat()
|
/linux-6.6.21/Documentation/devicetree/bindings/input/touchscreen/ |
D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/linux-6.6.21/arch/m68k/fpsp040/ |
D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/linux-6.6.21/drivers/mtd/ |
D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
/linux-6.6.21/Documentation/ABI/testing/ |
D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
D | sysfs-bus-event_source-devices-hv_gpci | 107 * "-EPERM" : Partition is not permitted to retrieve performance information, 139 * "-EPERM" : Partition is not permitted to retrieve performance information, 171 * "-EPERM" : Partition is not permitted to retrieve performance information, 203 * "-EPERM" : Partition is not permitted to retrieve performance information, 235 * "-EPERM" : Partition is not permitted to retrieve performance information,
|
D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/linux-6.6.21/arch/m68k/ifpsp060/ |
D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/linux-6.6.21/Documentation/devicetree/bindings/clock/ |
D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/linux-6.6.21/arch/arm/boot/dts/amazon/ |
D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
/linux-6.6.21/Documentation/devicetree/bindings/arm/ |
D | arm,trace-buffer-extension.yaml | 17 if it is permitted to use the component by checking the
|
/linux-6.6.21/Documentation/admin-guide/LSM/ |
D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
/linux-6.6.21/tools/testing/selftests/clone3/ |
D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
/linux-6.6.21/LICENSES/deprecated/ |
D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
/linux-6.6.21/LICENSES/preferred/ |
D | BSD-2-Clause | 13 modification, are permitted provided that the following conditions are met:
|