Searched refs:permitted (Results 1 - 2 of 2) sorted by relevance

/include/linux/
H A Dcapability.h47 __u32 permitted; member in struct:__user_cap_data_struct
72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon180
101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data
171 * Transfer any capability in your permitted set to any pid,
172 * remove any capability in your permitted set from any pid
524 const kernel_cap_t permitted)
528 cap_intersect(permitted, __cap_fs_set));
538 const kernel_cap_t permitted)
542 cap_intersect(permitted, __cap_nfsd_set));
523 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
537 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
H A Dsecurity.h77 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
81 const kernel_cap_t *permitted);
767 * from the kernel and should typically be permitted.
1250 * Get the @effective, @inheritable, and @permitted capability sets for
1257 * @permitted contains the permitted capability set.
1260 * Set the @effective, @inheritable, and @permitted capability sets for
1266 * @permitted contains the permitted capability set.
1388 kernel_cap_t *inheritable, kernel_cap_t *permitted);
1856 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1864 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
[all...]

Completed in 39 milliseconds