Searched defs:permitted (Results 1 - 4 of 4) sorted by relevance
/security/ |
H A D | commoncap.c | 181 * Determine whether the nominated task is permitted to trace the current 208 * @permitted: The place to record the permitted set 214 kernel_cap_t *inheritable, kernel_cap_t *permitted) 223 *permitted = cred->cap_permitted; 230 * permitted set. Returns 1 if they are limited, 0 if they are not. 250 * @permitted: A pointer to the proposed new permitted capabilities set 260 const kernel_cap_t *permitted) 276 if (!cap_issubset(*permitted, ol 213 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 256 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument 361 __u32 permitted = caps->permitted.cap[i]; local [all...] |
H A D | security.c | 183 kernel_cap_t *permitted) 185 return security_ops->capget(target, effective, inheritable, permitted); 191 const kernel_cap_t *permitted) 194 effective, inheritable, permitted); 180 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 188 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|
/security/apparmor/ |
H A D | lsm.c | 117 kernel_cap_t *inheritable, kernel_cap_t *permitted) 128 *permitted = cred->cap_permitted; 132 *permitted = cap_intersect(*permitted, profile->caps.allow); 116 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
|
/security/selinux/ |
H A D | hooks.c | 2019 kernel_cap_t *inheritable, kernel_cap_t *permitted) 2027 return cap_capget(target, effective, inheritable, permitted); 2033 const kernel_cap_t *permitted) 2038 effective, inheritable, permitted); 2175 * NNP: Operation not permitted for caller. 3530 * of state above, recheck that access is still permitted. 5726 operation will then fail if the context is not permitted. */ 6251 /* Not permitted after initial policy load. */ 2018 selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2030 selinux_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|
Completed in 36 milliseconds