Home
last modified time | relevance | path

Searched refs:permitted (Results 1 – 25 of 467) sorted by relevance

12345678910>>...19

/linux/kernel/
H A Dcapability.c165 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2()
220 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
244 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2()
252 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
H A Dauditsc.c1310 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps()
1443 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special()
1707 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit()
1710 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit()
1714 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit()
2233 name->fcap.permitted = caps.permitted; in audit_copy_fcaps()
2785 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps()
2791 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps()
2796 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps()
2818 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
/linux/include/linux/
H A Dcapability.h30 kernel_cap_t permitted; member
125 const kernel_cap_t permitted) in cap_raise_fs_set() argument
127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set()
136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
H A Dsecurity.h180 kernel_cap_t *inheritable, kernel_cap_t *permitted);
184 const kernel_cap_t *permitted);
344 kernel_cap_t *permitted);
348 const kernel_cap_t *permitted);
676 kernel_cap_t *permitted) in security_capget() argument
678 return cap_capget(target, effective, inheritable, permitted); in security_capget()
685 const kernel_cap_t *permitted) in security_capset() argument
687 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
/linux/security/
H A Dcommoncap.c231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
240 *permitted = cred->cap_permitted; in cap_capget()
276 const kernel_cap_t *permitted) in cap_capset() argument
292 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
296 if (!cap_issubset(*effective, *permitted)) in cap_capset()
301 new->cap_permitted = *permitted; in cap_capset()
308 cap_intersect(*permitted, in cap_capset()
635 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps()
638 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps()
728 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk()
[all …]
/linux/include/uapi/linux/
H A Dcapability.h47 __u32 permitted; member
77 __le32 permitted; /* Little endian */ member
88 __le32 permitted; /* Little endian */ member
/linux/arch/x86/kernel/fpu/
H A Dxstate.c1667 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument
1683 if ((permitted & requested) == requested) in __xstate_request_perm()
1692 mask = permitted | requested; in __xstate_request_perm()
1725 u64 permitted, requested; in xstate_request_perm() local
1744 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1745 if ((permitted & requested) == requested) in xstate_request_perm()
1750 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1753 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm()
1756 ret = __xstate_request_perm(permitted, requested, guest); in xstate_request_perm()
1843 u64 permitted, supported; in fpu_xstate_prctl() local
[all …]
/linux/security/safesetid/
H A Dlsm.c150 bool permitted; in id_permitted_for_cred() local
168 permitted = in id_permitted_for_cred()
171 if (!permitted) { in id_permitted_for_cred()
183 return permitted; in id_permitted_for_cred()
/linux/fs/proc/
H A Darray.c475 int permitted; in do_task_stat() local
488 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
501 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE|PF_POSTCOREDUMP))) { in do_task_stat()
538 if (permitted && (!whole || num_threads < 2)) in do_task_stat()
614 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat()
615 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat()
616 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat()
647 if (mm && permitted) { in do_task_stat()
658 if (permitted) in do_task_stat()
/linux/arch/m68k/fpsp040/
H A DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,
/linux/drivers/mtd/
H A DKconfig87 legal - in the USA you are only permitted to use this on PCMCIA
89 permitted to copy, modify and distribute the code as you wish. Just
104 legal - in the USA you are only permitted to use this on DiskOnChip
106 permitted to copy, modify and distribute the code as you wish. Just
129 legal - in the USA you are only permitted to use this on DiskOnChip
131 permitted to copy, modify and distribute the code as you wish. Just
/linux/Documentation/ABI/testing/
H A Dsysfs-driver-hid-picolcd24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
H A Dsysfs-bus-event_source-devices-hv_gpci107 * "-EPERM" : Partition is not permitted to retrieve performance information,
139 * "-EPERM" : Partition is not permitted to retrieve performance information,
171 * "-EPERM" : Partition is not permitted to retrieve performance information,
203 * "-EPERM" : Partition is not permitted to retrieve performance information,
235 * "-EPERM" : Partition is not permitted to retrieve performance information,
H A Dsysfs-driver-hid-logitech-hidpp6 (RW) This attribute controls the amount of 'turn' permitted in
/linux/Documentation/bpf/
H A Dfs_kfuncs.rst18 1. These kfuncs are only permitted from BPF LSM function.
/linux/arch/m68k/ifpsp060/
H A DREADME10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
H A DMISC10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
H A DCHANGES10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
/linux/Documentation/gpu/nova/core/
H A Dguidelines.rst17 Therefore, it is not permitted to leak firmware (version) specifics, through the
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/linux/arch/arm/boot/dts/amazon/
H A Dalpine-db.dts9 * without modification, are permitted provided that the following conditions
/linux/LICENSES/deprecated/
H A DLinux-OpenIB11 modification, are permitted provided that the following conditions are met:
/linux/tools/testing/selftests/clone3/
H A Dclone3_cap_checkpoint_restore.c121 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
/linux/arch/arm64/boot/dts/amazon/
H A Dalpine-v2-evp.dts13 * without modification, are permitted provided that the following
/linux/arch/arm/boot/dts/broadcom/
H A Dbcm94708.dts7 * modification, are permitted provided that the following conditions

12345678910>>...19