Searched refs:permitted (Results 1 – 6 of 6) sorted by relevance
| /security/ |
| A D | commoncap.c | 240 *permitted = cred->cap_permitted; in cap_capget() 276 const kernel_cap_t *permitted) in cap_capset() argument 296 if (!cap_issubset(*effective, *permitted)) in cap_capset() 301 new->cap_permitted = *permitted; in cap_capset() 308 cap_intersect(*permitted, in cap_capset() 635 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 728 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() 736 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk() 740 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk() 890 __cap_gained(permitted, new, old)) || in nonroot_raised_pE() [all …]
|
| A D | security.c | 1097 kernel_cap_t *permitted) in security_capget() argument 1099 return call_int_hook(capget, target, effective, inheritable, permitted); in security_capget() 1118 const kernel_cap_t *permitted) in security_capset() argument 1121 permitted); in security_capset()
|
| /security/safesetid/ |
| A D | lsm.c | 150 bool permitted; in id_permitted_for_cred() local 168 permitted = in id_permitted_for_cred() 171 if (!permitted) { in id_permitted_for_cred() 183 return permitted; in id_permitted_for_cred()
|
| /security/selinux/ |
| A D | Kconfig | 37 permissive mode (if permitted by the policy) via
|
| A D | hooks.c | 2127 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() argument 2136 const kernel_cap_t *permitted) in selinux_capset() argument
|
| /security/apparmor/ |
| A D | lsm.c | 164 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument 186 *permitted = cap_intersect(*permitted, allowed); in apparmor_capget()
|
Completed in 34 milliseconds