| /OK3568_Linux_fs/kernel/security/ |
| H A D | commoncap.c | 167 * Determine whether the nominated task is permitted to trace the current 194 * @permitted: The place to record the permitted set 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *permitted = cred->cap_permitted; in cap_capget() 216 * permitted set. Returns 1 if they are limited, 0 if they are not. 235 * @permitted: A pointer to the proposed new permitted capabilities set 245 const kernel_cap_t *permitted) in cap_capset() argument 260 /* verify restrictions on target's new Permitted set */ in cap_capset() 261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset() 265 if (!cap_issubset(*effective, *permitted)) in cap_capset() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/syscalls/ |
| H A D | rtas_filter.c | 226 printf("Test a permitted call, no parameters... "); in test() 248 // Test a permitted call, user-supplied size, buffer inside RMO in test() 250 printf("Test a permitted call, user-supplied size, buffer inside RMO... "); in test() 256 // Test a permitted call, user-supplied size, buffer start outside RMO in test() 258 printf("Test a permitted call, user-supplied size, buffer start outside RMO... "); in test() 264 // Test a permitted call, user-supplied size, buffer end outside RMO in test() 266 printf("Test a permitted call, user-supplied size, buffer end outside RMO... "); in test() 272 // Test a permitted call, fixed size, buffer end outside RMO in test() 274 printf("Test a permitted call, fixed size, buffer end outside RMO... "); in test()
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | PolyForm-Noncommercial-1.0.0 | 16 in it for any permitted purpose. However, you may 27 changes and new works permitted by [Changes and New Works 44 permitted purpose. 54 Any noncommercial purpose is a permitted purpose. 62 is use for a permitted purpose. 69 or government institution is use for a permitted purpose
|
| H A D | Artistic-2.0 | 6 Everyone is permitted to copy and distribute verbatim copies 17 You are always permitted to make arrangements wholly outside of this 70 (1) You are permitted to use the Standard Version and create and use 147 Package. Distributor Fees are permitted, and licensing fees for other 148 components in the aggregation are permitted. The terms of this license 152 (8) You are permitted to link Modified and Standard Versions with 198 NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL
|
| H A D | Net-SNMP | 15 …n and use in source and binary forms, with or without modification, are permitted provided that th… 25 …n and use in source and binary forms, with or without modification, are permitted provided that th… 43 Redistribution and use in source and binary forms, with or without modification, are permitted prov… 55 …n and use in source and binary forms, with or without modification, are permitted provided that th… 65 …n and use in source and binary forms, with or without modification, are permitted provided that th… 77 Redistribution and use in source and binary forms, with or without modification, are permitted prov… 91 Redistribution and use in source and binary forms, with or without modification, are permitted prov… 101 …n and use in source and binary forms, with or without modification, are permitted provided that th…
|
| H A D | PolyForm-Small-Business-1.0.0 | 16 in it for any permitted purpose. However, you may 27 changes and new works permitted by [Changes and New Works 44 permitted purpose. 60 a permitted purpose if your company has fewer than 100 total
|
| H A D | CC-BY-2.5-AU | 64 …SE MUTUALLY AGREED TO BY THE PARTIES IN WRITING, AND TO THE FULL EXTENT PERMITTED BY APPLICABLE LA… 68 TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, AND EXCEPT FOR ANY LIABILITY ARISING FROM CONTRARY … 70 …ed or modified, the Licensor's liability is limited, to the full extent permitted by the applicabl… 104 … the parties with respect to the Work licensed here. To the full extent permitted by applicable la… 108 …ll extent permitted by applicable law, makes no representation or warranty whatsoever in connectio… 110 …tive Commons without the prior written consent of Creative Commons. Any permitted use will be in c…
|
| H A D | Wsuipa | 3 …of the files is permitted as long as the file is not modified. Modifications, and redistribution o…
|
| H A D | Sleepycat | 7 modification, are permitted provided that the following conditions 41 modification, are permitted provided that the following conditions 68 modification, are permitted provided that the following conditions
|
| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | capability.c | 143 * @dataptr: pointer to struct that contains the effective, permitted, 172 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2() 208 * @data: pointer to struct that contains the effective, permitted, 216 * I: any raised capabilities must be a subset of the old permitted 217 * P: any raised capabilities must be a subset of the old permitted 218 * E: must be set to a subset of new permitted 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2() 256 permitted.cap[i] = 0; in SYSCALL_DEFINE2() 262 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/verifier/ |
| H A D | perf_event_sample_period.c | 2 "check bpf_perf_event_data->sample_period byte load permitted", 18 "check bpf_perf_event_data->sample_period half load permitted", 34 "check bpf_perf_event_data->sample_period word load permitted", 50 "check bpf_perf_event_data->sample_period dword load permitted",
|
| H A D | ctx_skb.c | 480 "__sk_buff->hash, offset 0, byte store not permitted", 491 "__sk_buff->tc_index, offset 3, byte store not permitted", 502 "check skb->hash byte load permitted", 517 "check skb->hash byte load permitted 1", 527 "check skb->hash byte load permitted 2", 537 "check skb->hash byte load permitted 3", 624 "check __sk_buff->hash, offset 0, half store not permitted", 635 "check __sk_buff->tc_index, offset 2, half store not permitted", 646 "check skb->hash half load permitted", 661 "check skb->hash half load permitted 2", [all …]
|
| /OK3568_Linux_fs/external/chromium/licenses/ |
| H A D | NOTICE | 5 modification, are permitted provided that the following conditions are met: 36 modification, are permitted provided that the following conditions are met: 64 modification, are permitted provided that the following conditions 105 modification, are permitted provided that the following conditions 134 modification, are permitted provided that the following conditions 213 modification, are permitted provided that the following conditions 257 modification, are permitted provided that the following conditions 286 modification, are permitted provided that the following conditions 314 modification, are permitted provided that the following conditions 358 modification, are permitted provided that the following conditions [all …]
|
| /OK3568_Linux_fs/kernel/drivers/mtd/ |
| H A D | Kconfig | 85 legal - in the USA you are only permitted to use this on PCMCIA 87 permitted to copy, modify and distribute the code as you wish. Just 102 legal - in the USA you are only permitted to use this on DiskOnChip 104 permitted to copy, modify and distribute the code as you wish. Just 127 legal - in the USA you are only permitted to use this on DiskOnChip 129 permitted to copy, modify and distribute the code as you wish. Just
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | sysfs-driver-hid-picolcd | 10 Writing: causes operation mode switch. Permitted values are 24 Reading/Writing: It is expressed in ms and permitted range is 37 within permitted rates.
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | capability.h | 31 kernel_cap_t permitted; member 182 const kernel_cap_t permitted) in cap_raise_fs_set() argument 186 cap_intersect(permitted, __cap_fs_set)); in cap_raise_fs_set() 196 const kernel_cap_t permitted) in cap_raise_nfsd_set() argument 200 cap_intersect(permitted, __cap_nfsd_set)); in cap_raise_nfsd_set()
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 138 would be permitted. The text will be either "1" indicating 146 would be permitted. The text will be either "1" indicating 250 otherwise be permitted, and are intended to provide additional 257 otherwise be permitted, and are intended to provide additional 313 the access permitted if it wouldn't be otherwise. Note that this 334 kind of access permitted a subject with subjectlabel on an 484 is permitted. 486 is permitted. [all …]
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | fs_context.c | 40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version() 64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
|
| /OK3568_Linux_fs/kernel/drivers/scsi/isci/ |
| H A D | remote_device.h | 30 * modification, are permitted provided that the following conditions 198 * permitted. This state is entered from the INITIAL state. This state 203 * IO operations are permitted. This state is entered from the STOPPED 249 * permitted, but existing IO operations are allowed to complete. This 254 * failed. In this state no new IO operations are permitted. This 259 * In this state no new IO operations are permitted. This state is
|
| H A D | host.h | 30 * modification, are permitted provided that the following conditions 234 * are permitted. 241 * initialized. In this state no new IO operations are permitted. 248 * ready (i.e. starting). In this state no new IO operations are permitted. 273 * In this state no new IO operations are permitted, but existing IO 281 * initialized. In this state no new IO operations are permitted.
|
| /OK3568_Linux_fs/kernel/fs/proc/ |
| H A D | array.c | 443 int permitted; in do_task_stat() local 455 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat() 468 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { in do_task_stat() 524 if (permitted && (!whole || num_threads < 2)) in do_task_stat() 568 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); in do_task_stat() 569 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); in do_task_stat() 570 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); in do_task_stat() 604 if (mm && permitted) { in do_task_stat() 615 if (permitted) in do_task_stat()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member 163 * Transfer any capability in your permitted set to any pid, 164 * remove any capability in your permitted set from any pid
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/share/doc/as.html/ |
| H A D | Infix-Ops.html | 73 <a name="index-operators_002c-permitted-arguments"></a> 131 <dd><a name="index-addition_002c-permitted-arguments"></a> 132 <a name="index-plus_002c-permitted-arguments"></a> 140 <a name="index-subtraction_002c-permitted-arguments"></a> 141 <a name="index-minus_002c-permitted-arguments"></a>
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member 163 * Transfer any capability in your permitted set to any pid, 164 * remove any capability in your permitted set from any pid
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/share/doc/as.html/ |
| H A D | Infix-Ops.html | 73 <a name="index-operators_002c-permitted-arguments"></a> 131 <dd><a name="index-addition_002c-permitted-arguments"></a> 132 <a name="index-plus_002c-permitted-arguments"></a> 140 <a name="index-subtraction_002c-permitted-arguments"></a> 141 <a name="index-minus_002c-permitted-arguments"></a>
|