Home
last modified time | relevance | path

Searched full:permitted (Results 1 – 25 of 6372) sorted by relevance

12345678910>>...255

/kernel/linux/linux-6.6/tools/testing/selftests/powerpc/syscalls/
Drtas_filter.c165 printf("Test a permitted call, no parameters... "); in test()
187 // Test a permitted call, user-supplied size, buffer inside RMO in test()
189 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test()
195 // Test a permitted call, user-supplied size, buffer start outside RMO in test()
197 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test()
203 // Test a permitted call, user-supplied size, buffer end outside RMO in test()
205 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test()
211 // Test a permitted call, fixed size, buffer end outside RMO in test()
213 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
/kernel/linux/linux-6.6/security/
Dcommoncap.c168 * Determine whether the nominated task is permitted to trace the current
195 * @permitted: The place to record the permitted set
201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
210 *permitted = cred->cap_permitted; in cap_capget()
217 * permitted set. Returns 1 if they are limited, 0 if they are not.
236 * @permitted: A pointer to the proposed new permitted capabilities set
246 const kernel_cap_t *permitted) in cap_capset() argument
261 /* verify restrictions on target's new Permitted set */ in cap_capset()
262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
266 if (!cap_issubset(*effective, *permitted)) in cap_capset()
[all …]
/kernel/linux/linux-5.10/security/
Dcommoncap.c167 * Determine whether the nominated task is permitted to trace the current
194 * @permitted: The place to record the permitted set
200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
209 *permitted = cred->cap_permitted; in cap_capget()
216 * permitted set. Returns 1 if they are limited, 0 if they are not.
235 * @permitted: A pointer to the proposed new permitted capabilities set
245 const kernel_cap_t *permitted) in cap_capset() argument
260 /* verify restrictions on target's new Permitted set */ in cap_capset()
261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
265 if (!cap_issubset(*effective, *permitted)) in cap_capset()
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/syscalls/
Drtas_filter.c226 printf("Test a permitted call, no parameters... "); in test()
248 // Test a permitted call, user-supplied size, buffer inside RMO in test()
250 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test()
256 // Test a permitted call, user-supplied size, buffer start outside RMO in test()
258 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test()
264 // Test a permitted call, user-supplied size, buffer end outside RMO in test()
266 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test()
272 // Test a permitted call, fixed size, buffer end outside RMO in test()
274 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/
Dperf_event_sample_period.c2 "check bpf_perf_event_data->sample_period byte load permitted",
18 "check bpf_perf_event_data->sample_period half load permitted",
34 "check bpf_perf_event_data->sample_period word load permitted",
50 "check bpf_perf_event_data->sample_period dword load permitted",
Dctx_skb.c480 "__sk_buff->hash, offset 0, byte store not permitted",
491 "__sk_buff->tc_index, offset 3, byte store not permitted",
502 "check skb->hash byte load permitted",
517 "check skb->hash byte load permitted 1",
527 "check skb->hash byte load permitted 2",
537 "check skb->hash byte load permitted 3",
624 "check __sk_buff->hash, offset 0, half store not permitted",
635 "check __sk_buff->tc_index, offset 2, half store not permitted",
646 "check skb->hash half load permitted",
661 "check skb->hash half load permitted 2",
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/verifier/
Dperf_event_sample_period.c2 "check bpf_perf_event_data->sample_period byte load permitted",
18 "check bpf_perf_event_data->sample_period half load permitted",
34 "check bpf_perf_event_data->sample_period word load permitted",
50 "check bpf_perf_event_data->sample_period dword load permitted",
Dctx_skb.c480 "__sk_buff->hash, offset 0, byte store not permitted",
491 "__sk_buff->tc_index, offset 3, byte store not permitted",
502 "check skb->hash byte load permitted",
517 "check skb->hash byte load permitted 1",
527 "check skb->hash byte load permitted 2",
537 "check skb->hash byte load permitted 3",
624 "check __sk_buff->hash, offset 0, half store not permitted",
635 "check __sk_buff->tc_index, offset 2, half store not permitted",
646 "check skb->hash half load permitted",
661 "check skb->hash half load permitted 2",
[all …]
/kernel/liteos_a/testsuites/unittest/security/capability/smoke/
Dcap_test_001.cpp6 * are permitted provided that the following conditions are met:
70 capdata[0].permitted = 0xffffffff; in TestChild()
71 capdata[1].permitted = 0xffffffff; in TestChild()
91 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
99 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
107 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
115 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
/kernel/linux/linux-6.6/kernel/
Dcapability.c136 * @dataptr: pointer to struct that contains the effective, permitted,
169 kdata[0].permitted = pP.val; kdata[1].permitted = pP.val >> 32; in SYSCALL_DEFINE2()
206 * @data: pointer to struct that contains the effective, permitted,
214 * I: any raised capabilities must be a subset of the old permitted
215 * P: any raised capabilities must be a subset of the old permitted
216 * E: must be set to a subset of new permitted
224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
248 permitted = mk_kernel_cap(kdata[0].permitted, kdata[1].permitted); in SYSCALL_DEFINE2()
256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
/kernel/linux/linux-5.10/kernel/
Dcapability.c143 * @dataptr: pointer to struct that contains the effective, permitted,
172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2()
208 * @data: pointer to struct that contains the effective, permitted,
216 * I: any raised capabilities must be a subset of the old permitted
217 * P: any raised capabilities must be a subset of the old permitted
218 * E: must be set to a subset of new permitted
226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2()
256 permitted.cap[i] = 0; in SYSCALL_DEFINE2()
262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
[all …]
/kernel/linux/linux-6.6/drivers/mtd/
DKconfig87 legal - in the USA you are only permitted to use this on PCMCIA
89 permitted to copy, modify and distribute the code as you wish. Just
104 legal - in the USA you are only permitted to use this on DiskOnChip
106 permitted to copy, modify and distribute the code as you wish. Just
129 legal - in the USA you are only permitted to use this on DiskOnChip
131 permitted to copy, modify and distribute the code as you wish. Just
/kernel/linux/linux-5.10/drivers/mtd/
DKconfig85 legal - in the USA you are only permitted to use this on PCMCIA
87 permitted to copy, modify and distribute the code as you wish. Just
102 legal - in the USA you are only permitted to use this on DiskOnChip
104 permitted to copy, modify and distribute the code as you wish. Just
127 legal - in the USA you are only permitted to use this on DiskOnChip
129 permitted to copy, modify and distribute the code as you wish. Just
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-driver-hid-picolcd10 Writing: causes operation mode switch. Permitted values are
24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
/kernel/linux/linux-6.6/Documentation/ABI/testing/
Dsysfs-driver-hid-picolcd10 Writing: causes operation mode switch. Permitted values are
24 Reading/Writing: It is expressed in ms and permitted range is
37 within permitted rates.
Dsysfs-bus-event_source-devices-hv_gpci107 * "-EPERM" : Partition is not permitted to retrieve performance information,
139 * "-EPERM" : Partition is not permitted to retrieve performance information,
171 * "-EPERM" : Partition is not permitted to retrieve performance information,
203 * "-EPERM" : Partition is not permitted to retrieve performance information,
235 * "-EPERM" : Partition is not permitted to retrieve performance information,
/kernel/linux/linux-6.6/include/linux/
Dcapability.h30 kernel_cap_t permitted; member
125 const kernel_cap_t permitted) in cap_raise_fs_set() argument
127 return cap_combine(a, cap_intersect(permitted, CAP_FS_SET)); in cap_raise_fs_set()
136 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
138 return cap_combine(a, cap_intersect(permitted, CAP_NFSD_SET)); in cap_raise_nfsd_set()
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/
Dcapability.h21 __u32 permitted; member
43 __le32 permitted; member
50 __le32 permitted; member
/kernel/linux/linux-5.10/fs/cifs/
Dfs_context.c40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
/kernel/linux/linux-5.10/include/linux/
Dcapability.h31 kernel_cap_t permitted; member
182 const kernel_cap_t permitted) in cap_raise_fs_set() argument
186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set()
196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument
200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
/kernel/linux/linux-5.10/drivers/scsi/isci/
Dremote_device.h30 * modification, are permitted provided that the following conditions
198 * permitted. This state is entered from the INITIAL state. This state
203 * IO operations are permitted. This state is entered from the STOPPED
249 * permitted, but existing IO operations are allowed to complete. This
254 * failed. In this state no new IO operations are permitted. This
259 * In this state no new IO operations are permitted. This state is
/kernel/linux/linux-6.6/drivers/scsi/isci/
Dremote_device.h30 * modification, are permitted provided that the following conditions
198 * permitted. This state is entered from the INITIAL state. This state
203 * IO operations are permitted. This state is entered from the STOPPED
249 * permitted, but existing IO operations are allowed to complete. This
254 * failed. In this state no new IO operations are permitted. This
259 * In this state no new IO operations are permitted. This state is
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/
DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/kernel/linux/linux-6.6/Documentation/admin-guide/LSM/
DSmack.rst95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
138 would be permitted. The text will be either "1" indicating
146 would be permitted. The text will be either "1" indicating
250 otherwise be permitted, and are intended to provide additional
257 otherwise be permitted, and are intended to provide additional
313 the access permitted if it wouldn't be otherwise. Note that this
334 kind of access permitted a subject with subjectlabel on an
484 is permitted.
486 is permitted.
[all …]
/kernel/linux/linux-5.10/arch/m68k/fpsp040/
DREADME10 To the maximum extent permitted by applicable law,
17 To the maximum extent permitted by applicable law,

12345678910>>...255