Home
last modified time | relevance | path

Searched full:permitted (Results 1 – 25 of 1369) sorted by relevance

12345678910>>...55

/linux/security/
H A Dcommoncap.c198 * Determine whether the nominated task is permitted to trace the current
225 * @permitted: The place to record the permitted set
231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget()
240 *permitted = cred->cap_permitted; in cap_capget()
247 * permitted set. Returns 1 if they are limited, 0 if they are not.
266 * @permitted: A pointer to the proposed new permitted capabilities set
276 const kernel_cap_t *permitted) in cap_capset()
291 /* verify restrictions on target's new Permitted se in cap_capset()
230 cap_capget(const struct task_struct * target,kernel_cap_t * effective,kernel_cap_t * inheritable,kernel_cap_t * permitted) cap_capget() argument
275 cap_capset(struct cred * new,const struct cred * old,const kernel_cap_t * effective,const kernel_cap_t * inheritable,const kernel_cap_t * permitted) cap_capset() argument
[all...]
/linux/tools/testing/selftests/powerpc/syscalls/
H A Drtas_filter.c165 printf("Test a permitted call, no parameters... "); in test()
187 // Test a permitted call, user-supplied size, buffer inside RMO in test()
189 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test()
195 // Test a permitted call, user-supplied size, buffer start outside RMO in test()
197 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test()
203 // Test a permitted call, user-supplied size, buffer end outside RMO in test()
205 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test()
211 // Test a permitted call, fixed size, buffer end outside RMO in test()
213 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
/linux/tools/testing/selftests/bpf/verifier/
H A Dperf_event_sample_period.c2 "check bpf_perf_event_data->sample_period byte load permitted",
18 "check bpf_perf_event_data->sample_period half load permitted",
34 "check bpf_perf_event_data->sample_period word load permitted",
50 "check bpf_perf_event_data->sample_period dword load permitted",
H A Dctx_skb.c480 "__sk_buff->hash, offset 0, byte store not permitted",
491 "__sk_buff->tc_index, offset 3, byte store not permitted",
502 "check skb->hash byte load permitted",
517 "check skb->hash byte load permitted 1",
527 "check skb->hash byte load permitted 2",
537 "check skb->hash byte load permitted 3",
624 "check __sk_buff->hash, offset 0, half store not permitted",
635 "check __sk_buff->tc_index, offset 2, half store not permitted",
646 "check skb->hash half load permitted",
661 "check skb->hash half load permitted 2",
[all …]
/linux/drivers/mtd/
H A DKconfig87 legal - in the USA you are only permitted to use this on PCMCIA
89 permitted to copy, modify and distribute the code as you wish. Just
104 legal - in the USA you are only permitted to use this on DiskOnChip
106 permitted to copy, modify and distribute the code as you wish. Just
129 legal - in the USA you are only permitted to use this on DiskOnChip
131 permitted to copy, modify and distribute the code as you wish. Just
/linux/Documentation/ABI/testing/
H A Dsysfs-driver-hid-picolcd10 Writing: causes operation mode switch. Permitted values are
24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
H A Dsysfs-bus-event_source-devices-hv_gpci107 * "-EPERM" : Partition is not permitted to retrieve performance information,
139 * "-EPERM" : Partition is not permitted to retrieve performance information,
171 * "-EPERM" : Partition is not permitted to retrieve performance information,
203 * "-EPERM" : Partition is not permitted to retrieve performance information,
235 * "-EPERM" : Partition is not permitted to retrieve performance information,
/linux/drivers/scsi/isci/
H A Dremote_device.h30 * modification, are permitted provided that the following conditions
170 * permitted. This state is entered from the INITIAL state. This state
175 * IO operations are permitted. This state is entered from the STOPPED
221 * permitted, but existing IO operations are allowed to complete. This
226 * failed. In this state no new IO operations are permitted. This
231 * In this state no new IO operations are permitted. This state is
H A Dhost.h30 * modification, are permitted provided that the following conditions
234 * are permitted.
241 * initialized. In this state no new IO operations are permitted.
248 * ready (i.e. starting). In this state no new IO operations are permitted.
273 * In this state no new IO operations are permitted, but existing IO
281 * initialized. In this state no new IO operations are permitted.
H A Dphy.h30 * modification, are permitted provided that the following conditions
344 * no new IO operations are permitted on this phy.
346 * this state no new IO operations are permitted on
371 * state no new IO operations are permitted on this
H A Dport.h30 * modification, are permitted provided that the following conditions
149 * no new IO operations are permitted. This state is
152 * state no new IO operations are permitted, but
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/linux/arch/x86/kernel/fpu/
H A Dxstate.c1667 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument
1683 if ((permitted & requested) == requested) in __xstate_request_perm()
1687 * Calculate the resulting kernel state size. Note, @permitted also in __xstate_request_perm()
1689 * permitted for kernel and guest FPUs, and never permitted for user in __xstate_request_perm()
1692 mask = permitted | requested; in __xstate_request_perm()
1725 u64 permitted, requested; in xstate_request_perm() local
1744 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1745 if ((permitted & requested) == requested) in xstate_request_perm()
1750 permitted = xstate_get_group_perm(guest); in xstate_request_perm()
1753 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm()
[all …]
/linux/arch/m68k/fpsp040/
H A DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,
/linux/include/linux/
H A Drcu_sync.h26 * rcu_sync_is_idle() - Are readers permitted to use their fastpaths?
29 * Returns true if readers are permitted to use their fastpaths. Must be
H A Dmutex_types.h18 * - multiple unlocks are not permitted
19 * - recursive locking is not permitted
/linux/fs/proc/
H A Darray.c475 int permitted; in do_task_stat() local
488 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
501 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE|PF_POSTCOREDUMP))) { in do_task_stat()
538 if (permitted && (!whole || num_threads < 2)) in do_task_stat()
614 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat()
615 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat()
616 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat()
647 if (mm && permitted) { in do_task_stat()
658 if (permitted) in do_task_stat()
/linux/security/safesetid/
H A Dlsm.c150 bool permitted; in id_permitted_for_cred() local
168 permitted = in id_permitted_for_cred()
171 if (!permitted) { in id_permitted_for_cred()
183 return permitted; in id_permitted_for_cred()
/linux/include/uapi/linux/netfilter/
H A Dnfnetlink_osf.h81 OSFOPT_SACKP, /* SACK permitted */
86 OSFOPT_POCP, /* Partial Order Connection Permitted */
/linux/arch/m68k/ifpsp060/
H A DREADME10 To the maximum extent permitted by applicable law,
16 To the maximum extent permitted by applicable law,
/linux/arch/um/kernel/skas/
H A Dstub_exe.c168 /* [10-16] Check against permitted syscalls */ in real_init()
189 /* [17] Not one of the permitted syscalls */ in real_init()
192 /* [18] Permitted call for the stub */ in real_init()
/linux/arch/riscv/mm/
H A Dcacheflush.c204 * @ctx: Set the type of icache flushing instructions permitted/prohibited in
230 * permitted to emit icache flushing instructions. Whenever any thread in the
239 * thread calling this function is permitted to emit icache flushing
/linux/arch/powerpc/include/uapi/asm/
H A Depapr_hcalls.h13 * modification, are permitted provided that the following conditions are met:
80 #define EV_EPERM 1 /* Operation not permitted */
/linux/drivers/regulator/
H A Dtps65912-regulator.c51 /* Operations permitted on DCDCx */
61 /* Operations permitted on LDOx */
/linux/Documentation/security/
H A Dcredentials.rst148 - Set of permitted capabilities
159 The permitted capabilities are those caps that the process might grant
160 itself to its effective or permitted sets through ``capset()``. This
278 A task may only alter its _own_ credentials; it is no longer permitted for a
280 is no longer permitted to take any PID other than the one of the current

12345678910>>...55