Searched refs:permitted (Results 1 - 2 of 2) sorted by relevance
/include/linux/ |
H A D | capability.h | 47 __u32 permitted; member in struct:__user_cap_data_struct 72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon180 101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data 171 * Transfer any capability in your permitted set to any pid, 172 * remove any capability in your permitted set from any pid 524 const kernel_cap_t permitted) 528 cap_intersect(permitted, __cap_fs_set)); 538 const kernel_cap_t permitted) 542 cap_intersect(permitted, __cap_nfsd_set)); 523 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument 537 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
|
H A D | security.h | 77 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 81 const kernel_cap_t *permitted); 767 * from the kernel and should typically be permitted. 1250 * Get the @effective, @inheritable, and @permitted capability sets for 1257 * @permitted contains the permitted capability set. 1260 * Set the @effective, @inheritable, and @permitted capability sets for 1266 * @permitted contains the permitted capability set. 1388 kernel_cap_t *inheritable, kernel_cap_t *permitted); 1856 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1864 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument [all...] |
Completed in 39 milliseconds