Lines Matching full:permitted

167  * Determine whether the nominated task is permitted to trace the current
194 * @permitted: The place to record the permitted set
200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
209 *permitted = cred->cap_permitted; in cap_capget()
216 * permitted set. Returns 1 if they are limited, 0 if they are not.
235 * @permitted: A pointer to the proposed new permitted capabilities set
245 const kernel_cap_t *permitted) in cap_capset() argument
260 /* verify restrictions on target's new Permitted set */ in cap_capset()
261 if (!cap_issubset(*permitted, old->cap_permitted)) in cap_capset()
265 if (!cap_issubset(*effective, *permitted)) in cap_capset()
270 new->cap_permitted = *permitted; in cap_capset()
273 * Mask off ambient bits that are no longer both permitted and in cap_capset()
277 cap_intersect(*permitted, in cap_capset()
544 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() local
552 (new->cap_bset.cap[i] & permitted) | in bprm_caps_from_vfs_caps()
555 if (permitted & ~new->cap_permitted.cap[i]) in bprm_caps_from_vfs_caps()
563 * missing some "forced" (aka file-permitted) capabilities. in bprm_caps_from_vfs_caps()
633 cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted); in get_vfs_caps_from_disk()
637 cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in get_vfs_caps_from_disk()
792 __cap_gained(permitted, new, old)) || in nonroot_raised_pE()
830 if (__cap_gained(permitted, new, old)) in cap_bprm_creds_from_file()
840 if ((is_setid || __cap_gained(permitted, new, old)) && in cap_bprm_creds_from_file()
893 __cap_grew(permitted, ambient, new)))) in cap_bprm_creds_from_file()
971 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
975 * {r,e,s}uid != 0, the permitted and effective capabilities are
982 * capabilities are set to the permitted capabilities.
991 * calls setuid() and switches away from uid==0. Both permitted and
1100 * cap_task_setscheduler - Detemine if scheduler policy change is permitted
1103 * Detemine if the requested scheduler policy change is permitted for the
1112 * cap_task_ioprio - Detemine if I/O priority change is permitted
1116 * Detemine if the requested I/O priority change is permitted for the specified
1125 * cap_task_ioprio - Detemine if task priority change is permitted
1129 * Detemine if the requested task priority change is permitted for the
1295 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
1300 * task is permitted, returning 1 if permission is granted, 0 if not.