| /linux-6.15/kernel/ |
| H A D | capability.c | 165 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2() 220 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 244 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2() 252 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
| H A D | auditsc.c | 1317 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1457 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1729 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1732 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1736 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2254 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2810 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2816 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2821 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2843 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
| /linux-6.15/include/linux/ |
| H A D | capability.h | 30 kernel_cap_t permitted; member 125 const kernel_cap_t permitted) in cap_raise_fs_set() argument 127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set() 136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
|
| H A D | security.h | 180 kernel_cap_t *inheritable, kernel_cap_t *permitted); 184 const kernel_cap_t *permitted); 346 kernel_cap_t *permitted); 350 const kernel_cap_t *permitted); 674 kernel_cap_t *permitted) in security_capget() argument 676 return cap_capget(target, effective, inheritable, permitted); in security_capget() 683 const kernel_cap_t *permitted) in security_capset() argument 685 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
| /linux-6.15/security/ |
| H A D | commoncap.c | 240 *permitted = cred->cap_permitted; in cap_capget() 276 const kernel_cap_t *permitted) in cap_capset() argument 296 if (!cap_issubset(*effective, *permitted)) in cap_capset() 301 new->cap_permitted = *permitted; in cap_capset() 308 cap_intersect(*permitted, in cap_capset() 635 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 728 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() 736 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk() 740 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk() 896 __cap_gained(permitted, new, old)) || in nonroot_raised_pE() [all …]
|
| /linux-6.15/include/uapi/linux/ |
| H A D | capability.h | 46 __u32 permitted; member 76 __le32 permitted; /* Little endian */ member 87 __le32 permitted; /* Little endian */ member
|
| /linux-6.15/arch/x86/kernel/fpu/ |
| H A D | xstate.c | 1606 if ((permitted & requested) == requested) in __xstate_request_perm() 1610 mask = permitted | requested; in __xstate_request_perm() 1644 u64 permitted, requested; in xstate_request_perm() local 1663 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1664 if ((permitted & requested) == requested) in xstate_request_perm() 1669 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1762 u64 permitted, supported; in fpu_xstate_prctl() local 1776 permitted = xstate_get_host_group_perm(); in fpu_xstate_prctl() 1777 permitted &= XFEATURE_MASK_USER_SUPPORTED; in fpu_xstate_prctl() 1778 return put_user(permitted, uptr); in fpu_xstate_prctl() [all …]
|
| /linux-6.15/security/safesetid/ |
| H A D | lsm.c | 150 bool permitted; in id_permitted_for_cred() local 168 permitted = in id_permitted_for_cred() 171 if (!permitted) { in id_permitted_for_cred() 183 return permitted; in id_permitted_for_cred()
|
| /linux-6.15/fs/proc/ |
| H A D | array.c | 477 int permitted; in do_task_stat() local 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 503 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE|PF_POSTCOREDUMP))) { in do_task_stat() 540 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 616 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 617 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 618 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 649 if (mm && permitted) { in do_task_stat() 660 if (permitted) in do_task_stat()
|
| /linux-6.15/Documentation/devicetree/bindings/input/touchscreen/ |
| H A D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
| /linux-6.15/arch/m68k/fpsp040/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
| /linux-6.15/drivers/mtd/ |
| H A D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
| H A D | sysfs-bus-event_source-devices-hv_gpci | 107 * "-EPERM" : Partition is not permitted to retrieve performance information, 139 * "-EPERM" : Partition is not permitted to retrieve performance information, 171 * "-EPERM" : Partition is not permitted to retrieve performance information, 203 * "-EPERM" : Partition is not permitted to retrieve performance information, 235 * "-EPERM" : Partition is not permitted to retrieve performance information,
|
| H A D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
| /linux-6.15/Documentation/bpf/ |
| H A D | fs_kfuncs.rst | 18 1. These kfuncs are only permitted from BPF LSM function.
|
| /linux-6.15/arch/m68k/ifpsp060/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| H A D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| /linux-6.15/Documentation/gpu/nova/core/ |
| H A D | guidelines.rst | 17 Therefore, it is not permitted to leak firmware (version) specifics, through the
|
| /linux-6.15/Documentation/devicetree/bindings/clock/ |
| H A D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
| /linux-6.15/Documentation/devicetree/bindings/arm/ |
| H A D | arm,trace-buffer-extension.yaml | 17 if it is permitted to use the component by checking the
|
| /linux-6.15/arch/arm/boot/dts/amazon/ |
| H A D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
| /linux-6.15/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. 489 label is permitted. [all …]
|
| /linux-6.15/tools/testing/selftests/clone3/ |
| H A D | clone3_cap_checkpoint_restore.c | 121 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
| /linux-6.15/LICENSES/deprecated/ |
| H A D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|