| /linux/security/ |
| H A D | commoncap.c | 231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 240 *permitted = cred->cap_permitted; in cap_capget() 276 const kernel_cap_t *permitted) in cap_capset() argument 292 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 296 if (!cap_issubset(*effective, *permitted)) in cap_capset() 301 new->cap_permitted = *permitted; in cap_capset() 308 cap_intersect(*permitted, in cap_capset() 645 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 648 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps() 738 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() [all …]
|
| /linux/security/safesetid/ |
| H A D | lsm.c | 150 bool permitted; in id_permitted_for_cred() local 168 permitted = in id_permitted_for_cred() 171 if (!permitted) { in id_permitted_for_cred() 183 return permitted; in id_permitted_for_cred()
|
| /linux/fs/proc/ |
| H A D | array.c | 475 int permitted; in do_task_stat() local 487 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 500 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE|PF_POSTCOREDUMP))) { in do_task_stat() 537 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 609 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 610 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 611 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 642 if (mm && permitted) { in do_task_stat() 653 if (permitted) in do_task_stat()
|
| /linux/arch/m68k/fpsp040/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
| /linux/drivers/mtd/ |
| H A D | Kconfig | 87 legal - in the USA you are only permitted to use this on PCMCIA 89 permitted to copy, modify and distribute the code as you wish. Just 104 legal - in the USA you are only permitted to use this on DiskOnChip 106 permitted to copy, modify and distribute the code as you wish. Just 129 legal - in the USA you are only permitted to use this on DiskOnChip 131 permitted to copy, modify and distribute the code as you wish. Just
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
| H A D | sysfs-bus-event_source-devices-hv_gpci | 107 * "-EPERM" : Partition is not permitted to retrieve performance information, 139 * "-EPERM" : Partition is not permitted to retrieve performance information, 171 * "-EPERM" : Partition is not permitted to retrieve performance information, 203 * "-EPERM" : Partition is not permitted to retrieve performance information, 235 * "-EPERM" : Partition is not permitted to retrieve performance information,
|
| H A D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
| /linux/arch/m68k/ifpsp060/ |
| H A D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| H A D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| H A D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
| /linux/Documentation/bpf/ |
| H A D | fs_kfuncs.rst | 18 1. These kfuncs are only permitted from BPF LSM function.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
| /linux/kernel/ |
| H A D | auditsc.c | 1310 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1443 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1707 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1710 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1714 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2233 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2780 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2786 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2791 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2813 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
| /linux/arch/arm/boot/dts/amazon/ |
| H A D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
| /linux/include/linux/ |
| H A D | security.h | 179 kernel_cap_t *inheritable, kernel_cap_t *permitted); 183 const kernel_cap_t *permitted); 343 kernel_cap_t *permitted); 347 const kernel_cap_t *permitted); 675 kernel_cap_t *permitted) in security_capget() argument 677 return cap_capget(target, effective, inheritable, permitted); in security_capget() 684 const kernel_cap_t *permitted) in security_capset() argument 686 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
| /linux/LICENSES/deprecated/ |
| H A D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|
| /linux/tools/testing/selftests/clone3/ |
| H A D | clone3_cap_checkpoint_restore.c | 121 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
| /linux/arch/arm/boot/dts/broadcom/ |
| H A D | bcm94708.dts | 7 * modification, are permitted provided that the following conditions
|
| H A D | bcm94709.dts | 7 * modification, are permitted provided that the following conditions
|
| H A D | bcm9hmidc.dtsi | 7 * modification, are permitted provided that the following conditions
|
| H A D | bcm911360k.dts | 7 * modification, are permitted provided that the following conditions
|
| /linux/arch/arm64/boot/dts/broadcom/stingray/ |
| H A D | bcm958742t.dts | 7 * modification, are permitted provided that the following conditions
|
| /linux/arch/arm64/boot/dts/amazon/ |
| H A D | alpine-v2-evp.dts | 13 * without modification, are permitted provided that the following
|
| /linux/LICENSES/preferred/ |
| H A D | BSD-2-Clause | 13 modification, are permitted provided that the following conditions are met:
|