Lines Matching defs:set

66  * The RCU callback to actually dispose of a set of credentials
93 * __put_cred - Destroy a set of credentials
96 * Destroy a set of credentials on which no references remain.
193 * prepare_creds - Prepare a new set of credentials for modification
195 * Prepare a new set of task credentials for modification. A task's creds
285 * set.
353 static bool cred_cap_issubset(const struct cred *set, const struct cred *subset)
355 const struct user_namespace *set_ns = set->user_ns;
359 * the capabilities of subset are a subset of set.
362 return cap_issubset(subset->cap_permitted, set->cap_permitted);
365 * therefore one is a subset of the other only if a set is an
366 * ancestor of subset and set->euid is owner of subset or one
371 uid_eq(subset_ns->owner, set->euid))
382 * Install a new set of credentials to the current task, using RCU to replace
383 * the old set. Both the objective and the subjective credentials pointers are
463 * abort_creds - Discard a set of credentials and unlock the current task
466 * Discard a set of credentials that were under construction and unlock the
483 * Install a set of temporary override subjective credentials on the current
484 * process, returning the old set for later reversion.
514 * Revert a temporary set of override subjective credentials to an old set,
515 * discarding the override set.
614 * prepare_kernel_cred - Prepare a set of credentials for a kernel service
617 * Prepare a set of credentials for a kernel service. This can then be used to
622 * that; if this is "&init_task", they'll be set to 0, no groups, full
681 * set_security_override - Set the security ID in a set of credentials
683 * @secid: The LSM security ID to set
685 * Set the LSM security ID in a set of credentials so that the subjective
686 * security is overridden when an alternative set of credentials is used.
695 * set_security_override_from_ctx - Set the security ID in a set of credentials
699 * Set the LSM security ID in a set of credentials so that the subjective
700 * security is overridden when an alternative set of credentials is used. The
718 * set_create_files_as - Set the LSM file create context in a set of credentials
722 * Change the LSM file creation context in a set of credentials to be the same