permitted         440 fs/proc/array.c 	int permitted;
permitted         452 fs/proc/array.c 	permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT);
permitted         465 fs/proc/array.c 		if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) {
permitted         521 fs/proc/array.c 	if (permitted && (!whole || num_threads < 2))
permitted         565 fs/proc/array.c 	seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0);
permitted         566 fs/proc/array.c 	seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0);
permitted         567 fs/proc/array.c 	seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0);
permitted         601 fs/proc/array.c 	if (mm && permitted) {
permitted         612 fs/proc/array.c 	if (permitted)
permitted          31 include/linux/capability.h 	kernel_cap_t permitted;
permitted         182 include/linux/capability.h 					    const kernel_cap_t permitted)
permitted         186 include/linux/capability.h 			   cap_intersect(permitted, __cap_fs_set));
permitted         196 include/linux/capability.h 					      const kernel_cap_t permitted)
permitted         200 include/linux/capability.h 			   cap_intersect(permitted, __cap_nfsd_set));
permitted        1472 include/linux/lsm_hooks.h 			kernel_cap_t *inheritable, kernel_cap_t *permitted);
permitted        1476 include/linux/lsm_hooks.h 			const kernel_cap_t *permitted);
permitted         137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
permitted         141 include/linux/security.h 		      const kernel_cap_t *permitted);
permitted         264 include/linux/security.h 		    kernel_cap_t *permitted);
permitted         268 include/linux/security.h 		    const kernel_cap_t *permitted);
permitted         522 include/linux/security.h 				   kernel_cap_t *permitted)
permitted         524 include/linux/security.h 	return cap_capget(target, effective, inheritable, permitted);
permitted         531 include/linux/security.h 				   const kernel_cap_t *permitted)
permitted         533 include/linux/security.h 	return cap_capset(new, old, effective, inheritable, permitted);
permitted          46 include/uapi/linux/capability.h         __u32 permitted;
permitted          75 include/uapi/linux/capability.h 		__le32 permitted;    /* Little endian */
permitted          86 include/uapi/linux/capability.h 		__le32 permitted;    /* Little endian */
permitted          52 kernel/audit.h 	kernel_cap_t		permitted;
permitted        1181 kernel/auditsc.c 	audit_log_cap(ab, "cap_fp", &name->fcap.permitted);
permitted        1274 kernel/auditsc.c 		audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted);
permitted        1489 kernel/auditsc.c 			audit_log_cap(ab, "fp", &axs->fcap.permitted);
permitted        1492 kernel/auditsc.c 			audit_log_cap(ab, "old_pp", &axs->old_pcap.permitted);
permitted        1496 kernel/auditsc.c 			audit_log_cap(ab, "pp", &axs->new_pcap.permitted);
permitted        1909 kernel/auditsc.c 	name->fcap.permitted = caps.permitted;
permitted        2458 kernel/auditsc.c 	ax->fcap.permitted = vcaps.permitted;
permitted        2464 kernel/auditsc.c 	ax->old_pcap.permitted   = old->cap_permitted;
permitted        2469 kernel/auditsc.c 	ax->new_pcap.permitted   = new->cap_permitted;
permitted        2490 kernel/auditsc.c 	context->capset.cap.permitted   = new->cap_permitted;
permitted         172 kernel/capability.c 			kdata[i].permitted = pP.cap[i];
permitted         226 kernel/capability.c 	kernel_cap_t inheritable, permitted, effective;
permitted         251 kernel/capability.c 		permitted.cap[i] = kdata[i].permitted;
permitted         256 kernel/capability.c 		permitted.cap[i] = 0;
permitted         262 kernel/capability.c 	permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;
permitted         270 kernel/capability.c 			      &effective, &inheritable, &permitted);
permitted         138 security/apparmor/lsm.c 			   kernel_cap_t *inheritable, kernel_cap_t *permitted)
permitted         160 security/apparmor/lsm.c 			*permitted = cap_intersect(*permitted,
permitted         200 security/commoncap.c 	       kernel_cap_t *inheritable, kernel_cap_t *permitted)
permitted         209 security/commoncap.c 	*permitted   = cred->cap_permitted;
permitted         245 security/commoncap.c 	       const kernel_cap_t *permitted)
permitted         261 security/commoncap.c 	if (!cap_issubset(*permitted, old->cap_permitted))
permitted         265 security/commoncap.c 	if (!cap_issubset(*effective, *permitted))
permitted         270 security/commoncap.c 	new->cap_permitted   = *permitted;
permitted         277 security/commoncap.c 					 cap_intersect(*permitted,
permitted         544 security/commoncap.c 		__u32 permitted = caps->permitted.cap[i];
permitted         552 security/commoncap.c 			(new->cap_bset.cap[i] & permitted) |
permitted         555 security/commoncap.c 		if (permitted & ~new->cap_permitted.cap[i])
permitted         633 security/commoncap.c 		cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted);
permitted         637 security/commoncap.c 	cpu_caps->permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;
permitted         791 security/commoncap.c 	       __cap_gained(permitted, new, old)) ||
permitted         828 security/commoncap.c 	if (__cap_gained(permitted, new, old))
permitted         838 security/commoncap.c 	if ((is_setid || __cap_gained(permitted, new, old)) &&
permitted         892 security/commoncap.c 	      __cap_grew(permitted, ambient, new))))
permitted         102 security/safesetid/lsm.c 	bool permitted;
permitted         113 security/safesetid/lsm.c 	permitted =
permitted         115 security/safesetid/lsm.c 	if (!permitted) {
permitted         120 security/safesetid/lsm.c 	return permitted;
permitted         709 security/security.c 		     kernel_cap_t *permitted)
permitted         712 security/security.c 				effective, inheritable, permitted);
permitted         718 security/security.c 		    const kernel_cap_t *permitted)
permitted         721 security/security.c 				effective, inheritable, permitted);
permitted        2148 security/selinux/hooks.c 			  kernel_cap_t *inheritable, kernel_cap_t *permitted)
permitted        2158 security/selinux/hooks.c 			  const kernel_cap_t *permitted)