• Home
  • Raw
  • Download

Lines Matching full:permitted

168  * Determine whether the nominated task is permitted to trace the current
195 * @permitted: The place to record the permitted set
201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
210 *permitted = cred->cap_permitted; in cap_capget()
217 * permitted set. Returns 1 if they are limited, 0 if they are not.
236 * @permitted: A pointer to the proposed new permitted capabilities set
246 const kernel_cap_t *permitted) in cap_capset() argument
261 /* verify restrictions on target's new Permitted set */ in cap_capset()
262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
266 if (!cap_issubset(*effective, *permitted)) in cap_capset()
271 new->cap_permitted = *permitted; in cap_capset()
274 * Mask off ambient bits that are no longer both permitted and in cap_capset()
278 cap_intersect(*permitted, in cap_capset()
605 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps()
608 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps()
615 * missing some "forced" (aka file-permitted) capabilities. in bprm_caps_from_vfs_caps()
698 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk()
706 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk()
710 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk()
866 __cap_gained(permitted, new, old)) || in nonroot_raised_pE()
906 if (__cap_gained(permitted, new, old)) in cap_bprm_creds_from_file()
916 if ((is_setid || __cap_gained(permitted, new, old)) && in cap_bprm_creds_from_file()
969 __cap_grew(permitted, ambient, new)))) in cap_bprm_creds_from_file()
1056 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
1060 * {r,e,s}uid != 0, the permitted and effective capabilities are
1067 * capabilities are set to the permitted capabilities.
1076 * calls setuid() and switches away from uid==0. Both permitted and
1187 * cap_task_setscheduler - Determine if scheduler policy change is permitted
1190 * Determine if the requested scheduler policy change is permitted for the
1201 * cap_task_setioprio - Determine if I/O priority change is permitted
1205 * Determine if the requested I/O priority change is permitted for the specified
1216 * cap_task_setnice - Determine if task priority change is permitted
1220 * Determine if the requested task priority change is permitted for the
1391 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
1396 * task is permitted.