/linux-6.3-rc2/kernel/ |
A D | capability.c | 169 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2() 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 248 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2() 256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
A D | auditsc.c | 1311 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1454 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1729 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1732 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1736 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2256 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2810 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2816 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2821 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2843 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/linux-6.3-rc2/security/ |
A D | commoncap.c | 210 *permitted = cred->cap_permitted; in cap_capget() 246 const kernel_cap_t *permitted) in cap_capset() argument 266 if (!cap_issubset(*effective, *permitted)) in cap_capset() 271 new->cap_permitted = *permitted; in cap_capset() 278 cap_intersect(*permitted, in cap_capset() 605 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 698 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() 706 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk() 710 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk() 866 __cap_gained(permitted, new, old)) || in nonroot_raised_pE() [all …]
|
/linux-6.3-rc2/include/linux/ |
A D | capability.h | 30 kernel_cap_t permitted; member 125 const kernel_cap_t permitted) in cap_raise_fs_set() argument 127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set() 136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
|
A D | security.h | 148 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 152 const kernel_cap_t *permitted); 277 kernel_cap_t *permitted); 281 const kernel_cap_t *permitted); 562 kernel_cap_t *permitted) in security_capget() argument 564 return cap_capget(target, effective, inheritable, permitted); in security_capget() 571 const kernel_cap_t *permitted) in security_capset() argument 573 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/linux-6.3-rc2/include/uapi/linux/ |
A D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/linux-6.3-rc2/arch/x86/kernel/fpu/ |
A D | xstate.c | 1600 if ((permitted & requested) == requested) in __xstate_request_perm() 1604 mask = permitted | requested; in __xstate_request_perm() 1638 u64 permitted, requested; in xstate_request_perm() local 1657 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1658 if ((permitted & requested) == requested) in xstate_request_perm() 1663 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1757 u64 permitted, supported; in fpu_xstate_prctl() local 1771 permitted = xstate_get_host_group_perm(); in fpu_xstate_prctl() 1772 permitted &= XFEATURE_MASK_USER_SUPPORTED; in fpu_xstate_prctl() 1773 return put_user(permitted, uptr); in fpu_xstate_prctl() [all …]
|
/linux-6.3-rc2/security/safesetid/ |
A D | lsm.c | 149 bool permitted; in id_permitted_for_cred() local 167 permitted = in id_permitted_for_cred() 170 if (!permitted) { in id_permitted_for_cred() 182 return permitted; in id_permitted_for_cred()
|
/linux-6.3-rc2/fs/proc/ |
A D | array.c | 462 int permitted; in do_task_stat() local 475 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 488 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 547 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 592 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 593 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 594 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 625 if (mm && permitted) { in do_task_stat() 636 if (permitted) in do_task_stat()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/input/touchscreen/ |
A D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/linux-6.3-rc2/arch/m68k/fpsp040/ |
A D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/linux-6.3-rc2/drivers/mtd/ |
A D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
A D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/linux-6.3-rc2/arch/m68k/ifpsp060/ |
A D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
A D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
A D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/linux-6.3-rc2/Documentation/devicetree/bindings/clock/ |
A D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/linux-6.3-rc2/Documentation/devicetree/bindings/arm/ |
A D | arm,trace-buffer-extension.yaml | 17 if it is permitted to use the component by checking the
|
/linux-6.3-rc2/arch/arm/boot/dts/ |
A D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
A D | bcm94708.dts | 7 * modification, are permitted provided that the following conditions
|
/linux-6.3-rc2/Documentation/admin-guide/LSM/ |
A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. 489 label is permitted. [all …]
|
/linux-6.3-rc2/tools/testing/selftests/clone3/ |
A D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
/linux-6.3-rc2/LICENSES/deprecated/ |
A D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
/linux-6.3-rc2/arch/arm64/boot/dts/amazon/ |
A D | alpine-v2-evp.dts | 13 * without modification, are permitted provided that the following
|