| /linux/security/ |
| H A D | commoncap.c | 198 * Determine whether the nominated task is permitted to trace the current 225 * @permitted: The place to record the permitted set 231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 240 *permitted = cred->cap_permitted; in cap_capget() 247 * permitted set. Returns 1 if they are limited, 0 if they are not. 266 * @permitted: A pointer to the proposed new permitted capabilities set 276 const kernel_cap_t *permitted) in cap_capset() argument 291 /* verify restrictions on target's new Permitted set */ in cap_capset() 292 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 296 if (!cap_issubset(*effective, *permitted)) in cap_capset() [all …]
|
| /linux/tools/testing/selftests/powerpc/syscalls/ |
| H A D | rtas_filter.c | 165 printf("Test a permitted call, no parameters... "); in test() 187 // Test a permitted call, user-supplied size, buffer inside RMO in test() 189 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test() 195 // Test a permitted call, user-supplied size, buffer start outside RMO in test() 197 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test() 203 // Test a permitted call, user-supplied size, buffer end outside RMO in test() 205 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test() 211 // Test a permitted call, fixed size, buffer end outside RMO in test() 213 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
|
| /linux/tools/testing/selftests/bpf/verifier/ |
| H A D | perf_event_sample_period.c | 2 "check bpf_perf_event_data->sample_period byte load permitted", 18 "check bpf_perf_event_data->sample_period half load permitted", 34 "check bpf_perf_event_data->sample_period word load permitted", 50 "check bpf_perf_event_data->sample_period dword load permitted",
|
| H A D | ctx_skb.c | 480 "__sk_buff->hash, offset 0, byte store not permitted", 491 "__sk_buff->tc_index, offset 3, byte store not permitted", 502 "check skb->hash byte load permitted", 517 "check skb->hash byte load permitted 1", 527 "check skb->hash byte load permitted 2", 537 "check skb->hash byte load permitted 3", 624 "check __sk_buff->hash, offset 0, half store not permitted", 635 "check __sk_buff->tc_index, offset 2, half store not permitted", 646 "check skb->hash half load permitted", 661 "check skb->hash half load permitted 2", [all …]
|
| /linux/drivers/mtd/ |
| H A D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-driver-hid-picolcd | 10 Writing: causes operation mode switch. Permitted values are 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
| H A D | sysfs-bus-event_source-devices-hv_gpci | 107 * "-EPERM" : Partition is not permitted to retrieve performance information, 139 * "-EPERM" : Partition is not permitted to retrieve performance information, 171 * "-EPERM" : Partition is not permitted to retrieve performance information, 203 * "-EPERM" : Partition is not permitted to retrieve performance information, 235 * "-EPERM" : Partition is not permitted to retrieve performance information,
|
| /linux/drivers/scsi/isci/ |
| H A D | remote_device.h | 30 * modification, are permitted provided that the following conditions 170 * permitted. This state is entered from the INITIAL state. This state 175 * IO operations are permitted. This state is entered from the STOPPED 221 * permitted, but existing IO operations are allowed to complete. This 226 * failed. In this state no new IO operations are permitted. This 231 * In this state no new IO operations are permitted. This state is
|
| H A D | host.h | 30 * modification, are permitted provided that the following conditions 234 * are permitted. 241 * initialized. In this state no new IO operations are permitted. 248 * ready (i.e. starting). In this state no new IO operations are permitted. 273 * In this state no new IO operations are permitted, but existing IO 281 * initialized. In this state no new IO operations are permitted.
|
| H A D | phy.h | 30 * modification, are permitted provided that the following conditions 344 * no new IO operations are permitted on this phy. 346 * this state no new IO operations are permitted on 371 * state no new IO operations are permitted on this
|
| H A D | port.h | 30 * modification, are permitted provided that the following conditions 149 * no new IO operations are permitted. This state is 152 * state no new IO operations are permitted, but
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
| /linux/arch/x86/kernel/fpu/ |
| H A D | xstate.c | 1668 static int __xstate_request_perm(u64 permitted, u64 requested, bool guest) in __xstate_request_perm() argument 1684 if ((permitted & requested) == requested) in __xstate_request_perm() 1688 * Calculate the resulting kernel state size. Note, @permitted also in __xstate_request_perm() 1690 * permitted for kernel and guest FPUs, and never permitted for user in __xstate_request_perm() 1693 mask = permitted | requested; in __xstate_request_perm() 1726 u64 permitted, requested; in xstate_request_perm() local 1745 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1746 if ((permitted & requested) == requested) in xstate_request_perm() 1751 permitted = xstate_get_group_perm(guest); in xstate_request_perm() 1754 if (guest && (permitted & FPU_GUEST_PERM_LOCKED)) in xstate_request_perm() [all …]
|
| /linux/arch/m68k/fpsp040/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
| /linux/include/linux/ |
| H A D | rcu_sync.h | 26 * rcu_sync_is_idle() - Are readers permitted to use their fastpaths? 29 * Returns true if readers are permitted to use their fastpaths. Must be
|
| H A D | mutex_types.h | 18 * - multiple unlocks are not permitted 19 * - recursive locking is not permitted
|
| H A D | pci-tsm.h | 174 * No device secrets are permitted, and no device state is changed. 182 * permitted. 189 * TDISP operational requirements. No device secrets are permitted.
|
| /linux/fs/proc/ |
| H A D | array.c | 475 int permitted; in do_task_stat() local 487 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 500 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE|PF_POSTCOREDUMP))) { in do_task_stat() 537 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 609 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 610 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 611 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 642 if (mm && permitted) { in do_task_stat() 653 if (permitted) in do_task_stat()
|
| /linux/security/safesetid/ |
| H A D | lsm.c | 150 bool permitted; in id_permitted_for_cred() local 168 permitted = in id_permitted_for_cred() 171 if (!permitted) { in id_permitted_for_cred() 183 return permitted; in id_permitted_for_cred()
|
| /linux/include/uapi/linux/netfilter/ |
| H A D | nfnetlink_osf.h | 81 OSFOPT_SACKP, /* SACK permitted */ 86 OSFOPT_POCP, /* Partial Order Connection Permitted */
|
| /linux/arch/m68k/ifpsp060/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| /linux/arch/um/kernel/skas/ |
| H A D | stub_exe.c | 168 /* [10-16] Check against permitted syscalls */ in real_init() 189 /* [17] Not one of the permitted syscalls */ in real_init() 192 /* [18] Permitted call for the stub */ in real_init()
|
| /linux/arch/riscv/mm/ |
| H A D | cacheflush.c | 204 * @ctx: Set the type of icache flushing instructions permitted/prohibited in 230 * permitted to emit icache flushing instructions. Whenever any thread in the 239 * thread calling this function is permitted to emit icache flushing
|
| /linux/arch/powerpc/include/uapi/asm/ |
| H A D | epapr_hcalls.h | 13 * modification, are permitted provided that the following conditions are met: 80 #define EV_EPERM 1 /* Operation not permitted */
|
| /linux/drivers/regulator/ |
| H A D | tps65912-regulator.c | 51 /* Operations permitted on DCDCx */ 61 /* Operations permitted on LDOx */
|