Lines Matching full:permitted
168 * Determine whether the nominated task is permitted to trace the current
195 * @permitted: The place to record the permitted set
201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
210 *permitted = cred->cap_permitted; in cap_capget()
217 * permitted set. Returns 1 if they are limited, 0 if they are not.
236 * @permitted: A pointer to the proposed new permitted capabilities set
246 const kernel_cap_t *permitted) in cap_capset() argument
261 /* verify restrictions on target's new Permitted set */ in cap_capset()
262 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
266 if (!cap_issubset(*effective, *permitted)) in cap_capset()
271 new->cap_permitted = *permitted; in cap_capset()
274 * Mask off ambient bits that are no longer both permitted and in cap_capset()
278 cap_intersect(*permitted, in cap_capset()
610 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local
618 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps()
621 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps()
629 * missing some "forced" (aka file-permitted) capabilities. in bprm_caps_from_vfs_caps()
714 cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted); in get_vfs_caps_from_disk()
718 cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in get_vfs_caps_from_disk()
874 __cap_gained(permitted, new, old)) || in nonroot_raised_pE()
914 if (__cap_gained(permitted, new, old)) in cap_bprm_creds_from_file()
924 if ((is_setid || __cap_gained(permitted, new, old)) && in cap_bprm_creds_from_file()
977 __cap_grew(permitted, ambient, new)))) in cap_bprm_creds_from_file()
1064 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
1068 * {r,e,s}uid != 0, the permitted and effective capabilities are
1075 * capabilities are set to the permitted capabilities.
1084 * calls setuid() and switches away from uid==0. Both permitted and
1195 * cap_task_setscheduler - Detemine if scheduler policy change is permitted
1198 * Detemine if the requested scheduler policy change is permitted for the
1209 * cap_task_setioprio - Detemine if I/O priority change is permitted
1213 * Detemine if the requested I/O priority change is permitted for the specified
1224 * cap_task_setnice - Detemine if task priority change is permitted
1228 * Detemine if the requested task priority change is permitted for the
1399 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
1404 * task is permitted.