permitted 440 fs/proc/array.c int permitted; permitted 452 fs/proc/array.c permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); permitted 465 fs/proc/array.c if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { permitted 521 fs/proc/array.c if (permitted && (!whole || num_threads < 2)) permitted 565 fs/proc/array.c seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); permitted 566 fs/proc/array.c seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); permitted 567 fs/proc/array.c seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); permitted 601 fs/proc/array.c if (mm && permitted) { permitted 612 fs/proc/array.c if (permitted) permitted 31 include/linux/capability.h kernel_cap_t permitted; permitted 182 include/linux/capability.h const kernel_cap_t permitted) permitted 186 include/linux/capability.h cap_intersect(permitted, __cap_fs_set)); permitted 196 include/linux/capability.h const kernel_cap_t permitted) permitted 200 include/linux/capability.h cap_intersect(permitted, __cap_nfsd_set)); permitted 1472 include/linux/lsm_hooks.h kernel_cap_t *inheritable, kernel_cap_t *permitted); permitted 1476 include/linux/lsm_hooks.h const kernel_cap_t *permitted); permitted 137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); permitted 141 include/linux/security.h const kernel_cap_t *permitted); permitted 264 include/linux/security.h kernel_cap_t *permitted); permitted 268 include/linux/security.h const kernel_cap_t *permitted); permitted 522 include/linux/security.h kernel_cap_t *permitted) permitted 524 include/linux/security.h return cap_capget(target, effective, inheritable, permitted); permitted 531 include/linux/security.h const kernel_cap_t *permitted) permitted 533 include/linux/security.h return cap_capset(new, old, effective, inheritable, permitted); permitted 46 include/uapi/linux/capability.h __u32 permitted; permitted 75 include/uapi/linux/capability.h __le32 permitted; /* Little endian */ permitted 86 include/uapi/linux/capability.h __le32 permitted; /* Little endian */ permitted 52 kernel/audit.h kernel_cap_t permitted; permitted 1181 kernel/auditsc.c audit_log_cap(ab, "cap_fp", &name->fcap.permitted); permitted 1274 kernel/auditsc.c audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); permitted 1489 kernel/auditsc.c audit_log_cap(ab, "fp", &axs->fcap.permitted); permitted 1492 kernel/auditsc.c audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted); permitted 1496 kernel/auditsc.c audit_log_cap(ab, "pp", &axs->new_pcap.permitted); permitted 1909 kernel/auditsc.c name->fcap.permitted = caps.permitted; permitted 2458 kernel/auditsc.c ax->fcap.permitted = vcaps.permitted; permitted 2464 kernel/auditsc.c ax->old_pcap.permitted = old->cap_permitted; permitted 2469 kernel/auditsc.c ax->new_pcap.permitted = new->cap_permitted; permitted 2490 kernel/auditsc.c context->capset.cap.permitted = new->cap_permitted; permitted 172 kernel/capability.c kdata[i].permitted = pP.cap[i]; permitted 226 kernel/capability.c kernel_cap_t inheritable, permitted, effective; permitted 251 kernel/capability.c permitted.cap[i] = kdata[i].permitted; permitted 256 kernel/capability.c permitted.cap[i] = 0; permitted 262 kernel/capability.c permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; permitted 270 kernel/capability.c &effective, &inheritable, &permitted); permitted 138 security/apparmor/lsm.c kernel_cap_t *inheritable, kernel_cap_t *permitted) permitted 160 security/apparmor/lsm.c *permitted = cap_intersect(*permitted, permitted 200 security/commoncap.c kernel_cap_t *inheritable, kernel_cap_t *permitted) permitted 209 security/commoncap.c *permitted = cred->cap_permitted; permitted 245 security/commoncap.c const kernel_cap_t *permitted) permitted 261 security/commoncap.c if (!cap_issubset(*permitted, old->cap_permitted)) permitted 265 security/commoncap.c if (!cap_issubset(*effective, *permitted)) permitted 270 security/commoncap.c new->cap_permitted = *permitted; permitted 277 security/commoncap.c cap_intersect(*permitted, permitted 544 security/commoncap.c __u32 permitted = caps->permitted.cap[i]; permitted 552 security/commoncap.c (new->cap_bset.cap[i] & permitted) | permitted 555 security/commoncap.c if (permitted & ~new->cap_permitted.cap[i]) permitted 633 security/commoncap.c cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted); permitted 637 security/commoncap.c cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; permitted 791 security/commoncap.c __cap_gained(permitted, new, old)) || permitted 828 security/commoncap.c if (__cap_gained(permitted, new, old)) permitted 838 security/commoncap.c if ((is_setid || __cap_gained(permitted, new, old)) && permitted 892 security/commoncap.c __cap_grew(permitted, ambient, new)))) permitted 102 security/safesetid/lsm.c bool permitted; permitted 113 security/safesetid/lsm.c permitted = permitted 115 security/safesetid/lsm.c if (!permitted) { permitted 120 security/safesetid/lsm.c return permitted; permitted 709 security/security.c kernel_cap_t *permitted) permitted 712 security/security.c effective, inheritable, permitted); permitted 718 security/security.c const kernel_cap_t *permitted) permitted 721 security/security.c effective, inheritable, permitted); permitted 2148 security/selinux/hooks.c kernel_cap_t *inheritable, kernel_cap_t *permitted) permitted 2158 security/selinux/hooks.c const kernel_cap_t *permitted)