Searched defs:permitted (Results 1 - 4 of 4) sorted by relevance

/security/
H A Dcommoncap.c181 * Determine whether the nominated task is permitted to trace the current
208 * @permitted: The place to record the permitted set
214 kernel_cap_t *inheritable, kernel_cap_t *permitted)
223 *permitted = cred->cap_permitted;
230 * permitted set. Returns 1 if they are limited, 0 if they are not.
250 * @permitted: A pointer to the proposed new permitted capabilities set
260 const kernel_cap_t *permitted)
276 if (!cap_issubset(*permitted, ol
213 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
256 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
361 __u32 permitted = caps->permitted.cap[i]; local
[all...]
H A Dsecurity.c183 kernel_cap_t *permitted)
185 return security_ops->capget(target, effective, inheritable, permitted);
191 const kernel_cap_t *permitted)
194 effective, inheritable, permitted);
180 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
188 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
/security/apparmor/
H A Dlsm.c117 kernel_cap_t *inheritable, kernel_cap_t *permitted)
128 *permitted = cred->cap_permitted;
132 *permitted = cap_intersect(*permitted, profile->caps.allow);
116 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
/security/selinux/
H A Dhooks.c2019 kernel_cap_t *inheritable, kernel_cap_t *permitted)
2027 return cap_capget(target, effective, inheritable, permitted);
2033 const kernel_cap_t *permitted)
2038 effective, inheritable, permitted);
2175 * NNP: Operation not permitted for caller.
3530 * of state above, recheck that access is still permitted.
5726 operation will then fail if the context is not permitted. */
6251 /* Not permitted after initial policy load. */
2018 selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
2030 selinux_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument

Completed in 36 milliseconds