/kernel/liteos_a/testsuites/unittest/security/capability/smoke/ |
D | cap_test_001.cpp | 70 capdata[0].permitted = 0xffffffff; in TestChild() 71 capdata[1].permitted = 0xffffffff; in TestChild() 91 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 99 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 107 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 115 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
|
/kernel/linux/linux-5.10/kernel/ |
D | capability.c | 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1210 audit_log_cap(ab, "cap_fp", &name->fcap.permitted); in audit_log_fcaps() 1350 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special() 1570 audit_log_cap(ab, "fp", &axs->fcap.permitted); in audit_log_exit() 1573 audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); in audit_log_exit() 1577 audit_log_cap(ab, "pp", &axs->new_pcap.permitted); in audit_log_exit() 2003 name->fcap.permitted = caps.permitted; in audit_copy_fcaps() 2552 ax->fcap.permitted = vcaps.permitted; in __audit_log_bprm_fcaps() 2558 ax->old_pcap.permitted = old->cap_permitted; in __audit_log_bprm_fcaps() 2563 ax->new_pcap.permitted = new->cap_permitted; in __audit_log_bprm_fcaps() 2584 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
|
/kernel/linux/linux-5.10/security/ |
D | commoncap.c | 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *permitted = cred->cap_permitted; in cap_capget() 245 const kernel_cap_t *permitted) in cap_capset() argument 261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() 270 new->cap_permitted = *permitted; in cap_capset() 277 cap_intersect(*permitted, in cap_capset() 565 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local 573 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps() 576 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps() [all …]
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
D | capability.h | 34 __u32 permitted; member 56 __le32 permitted; member 63 __le32 permitted; member
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
D | capability.h | 21 __u32 permitted; member 43 __le32 permitted; member 50 __le32 permitted; member
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/kernel/linux/linux-5.10/include/linux/ |
D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
D | security.h | 144 … task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 148 const kernel_cap_t *permitted); 271 kernel_cap_t *permitted); 275 const kernel_cap_t *permitted); 536 kernel_cap_t *permitted) in security_capget() argument 538 return cap_capget(target, effective, inheritable, permitted); in security_capget() 545 const kernel_cap_t *permitted) in security_capset() argument 547 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
/kernel/linux/linux-5.10/security/safesetid/ |
D | lsm.c | 158 bool permitted; in id_permitted_for_cred() local 176 permitted = in id_permitted_for_cred() 179 if (!permitted) { in id_permitted_for_cred() 191 return permitted; in id_permitted_for_cred()
|
/kernel/linux/linux-5.10/fs/proc/ |
D | array.c | 443 int permitted; in do_task_stat() local 455 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 468 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 524 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 568 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 569 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 570 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 604 if (mm && permitted) { in do_task_stat() 615 if (permitted) in do_task_stat()
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/input/touchscreen/ |
D | bu21013.txt | 23 - rohm,touch-max-x : Maximum outward permitted limit in the X axis 24 - rohm,touch-max-y : Maximum outward permitted limit in the Y axis
|
/kernel/linux/linux-5.10/arch/m68k/fpsp040/ |
D | README | 10 To the maximum extent permitted by applicable law, 17 To the maximum extent permitted by applicable law,
|
/kernel/linux/linux-5.10/drivers/mtd/ |
D | Kconfig | 85 legal - in the USA you are only permitted to use this on PCMCIA 87 permitted to copy, modify and distribute the code as you wish. Just 102 legal - in the USA you are only permitted to use this on DiskOnChip 104 permitted to copy, modify and distribute the code as you wish. Just 127 legal - in the USA you are only permitted to use this on DiskOnChip 129 permitted to copy, modify and distribute the code as you wish. Just
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | sysfs-driver-hid-picolcd | 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
D | sysfs-driver-hid-logitech-hidpp | 6 (RW) This attribute controls the amount of 'turn' permitted in
|
/kernel/linux/linux-5.10/arch/m68k/ifpsp060/ |
D | README | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | MISC | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
D | CHANGES | 10 To the maximum extent permitted by applicable law, 16 To the maximum extent permitted by applicable law,
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/clock/ |
D | brcm,bcm2835-aux-clock.txt | 12 - #clock-cells: Should be <1>. The permitted clock-specifier values can be
|
/kernel/linux/linux-5.10/arch/arm/boot/dts/ |
D | alpine-db.dts | 9 * without modification, are permitted provided that the following conditions
|
/kernel/linux/linux-5.10/Documentation/networking/devlink/ |
D | sja1105.rst | 47 number of permitted VLANs may be less than 7 per
|
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/ |
D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
/kernel/linux/linux-5.10/tools/testing/selftests/clone3/ |
D | clone3_cap_checkpoint_restore.c | 125 cap->data[1].permitted |= 1 << (40 - 32); in set_capability()
|
/kernel/linux/linux-5.10/LICENSES/deprecated/ |
D | Linux-OpenIB | 11 modification, are permitted provided that the following conditions are met:
|