Searched refs:permitted (Results 1 - 3 of 3) sorted by relevance

/include/uapi/linux/
H A Dcapability.h47 __u32 permitted; member in struct:__user_cap_data_struct
72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon1683
150 * Transfer any capability in your permitted set to any pid,
151 * remove any capability in your permitted set from any pid
/include/linux/
H A Dcapability.h30 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data
187 const kernel_cap_t permitted)
191 cap_intersect(permitted, __cap_fs_set));
201 const kernel_cap_t permitted)
205 cap_intersect(permitted, __cap_nfsd_set));
186 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
200 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
H A Dsecurity.h81 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
85 const kernel_cap_t *permitted);
796 * from the kernel and should typically be permitted.
1302 * Get the @effective, @inheritable, and @permitted capability sets for
1309 * @permitted contains the permitted capability set.
1312 * Set the @effective, @inheritable, and @permitted capability sets for
1318 * @permitted contains the permitted capability set.
1453 kernel_cap_t *inheritable, kernel_cap_t *permitted);
1970 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1978 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
[all...]

Completed in 55 milliseconds