• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/

Lines Matching refs:permitted

130  * Determine whether the nominated task is permitted to trace the current
151 * @permitted: The place to record the permitted set
157 kernel_cap_t *inheritable, kernel_cap_t *permitted)
166 *permitted = cred->cap_permitted;
173 * permitted set. Returns 1 if they are limited, 0 if they are not.
193 * @permitted: A pointer to the proposed new permitted capabilities set
203 const kernel_cap_t *permitted)
219 if (!cap_issubset(*permitted, old->cap_permitted))
223 if (!cap_issubset(*effective, *permitted))
228 new->cap_permitted = *permitted;
300 __u32 permitted = caps->permitted.cap[i];
307 (new->cap_bset.cap[i] & permitted) |
310 if (permitted & ~new->cap_permitted.cap[i])
318 * missing some "forced" (aka file-permitted) capabilities.
370 cpu_caps->permitted.cap[i] = le32_to_cpu(caps.data[i].permitted);
606 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
610 * {r,e,s}uid != 0, the permitted and effective capabilities are
617 * capabilities are set to the permitted capabilities.
626 * calls setuid() and switches away from uid==0. Both permitted and
714 * cap_task_setscheduler - Detemine if scheduler policy change is permitted
719 * Detemine if the requested scheduler policy change is permitted for the
729 * cap_task_ioprio - Detemine if I/O priority change is permitted
733 * Detemine if the requested I/O priority change is permitted for the specified
742 * cap_task_ioprio - Detemine if task priority change is permitted
746 * Detemine if the requested task priority change is permitted for the
884 * cap_syslog - Determine whether syslog function is permitted
888 * Determine whether the current process is permitted to use a particular
902 * cap_vm_enough_memory - Determine whether a new virtual mapping is permitted
907 * task is permitted, returning 0 if permission is granted, -ve if not.