Lines Matching full:permitted
197 * Determine whether the nominated task is permitted to trace the current
224 * @permitted: The place to record the permitted set
230 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
239 *permitted = cred->cap_permitted; in cap_capget()
246 * permitted set. Returns 1 if they are limited, 0 if they are not.
265 * @permitted: A pointer to the proposed new permitted capabilities set
275 const kernel_cap_t *permitted) in cap_capset() argument
290 /* verify restrictions on target's new Permitted set */ in cap_capset()
291 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
295 if (!cap_issubset(*effective, *permitted)) in cap_capset()
300 new->cap_permitted = *permitted; in cap_capset()
303 * Mask off ambient bits that are no longer both permitted and in cap_capset()
307 cap_intersect(*permitted, in cap_capset()
634 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps()
637 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps()
644 * missing some "forced" (aka file-permitted) capabilities. in bprm_caps_from_vfs_caps()
727 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk()
735 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk()
739 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk()
895 __cap_gained(permitted, new, old)) || in nonroot_raised_pE()
935 if (__cap_gained(permitted, new, old)) in cap_bprm_creds_from_file()
945 if ((is_setid || __cap_gained(permitted, new, old)) && in cap_bprm_creds_from_file()
998 __cap_grew(permitted, ambient, new)))) in cap_bprm_creds_from_file()
1085 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
1089 * {r,e,s}uid != 0, the permitted and effective capabilities are
1096 * capabilities are set to the permitted capabilities.
1105 * calls setuid() and switches away from uid==0. Both permitted and
1216 * cap_task_setscheduler - Determine if scheduler policy change is permitted
1219 * Determine if the requested scheduler policy change is permitted for the
1230 * cap_task_setioprio - Determine if I/O priority change is permitted
1234 * Determine if the requested I/O priority change is permitted for the specified
1245 * cap_task_setnice - Determine if task priority change is permitted
1249 * Determine if the requested task priority change is permitted for the
1437 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
1442 * task is permitted.