/Linux-v4.19/kernel/ |
D | capability.c | 175 kdata[i].inheritable = pI.cap[i]; in SYSCALL_DEFINE2() 228 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 254 inheritable.cap[i] = kdata[i].inheritable; in SYSCALL_DEFINE2() 259 inheritable.cap[i] = 0; in SYSCALL_DEFINE2() 265 inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 272 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1268 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special() 1392 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit() 1395 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit() 1399 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit() 2371 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps() 2376 ax->old_pcap.inheritable = old->cap_inheritable; in __audit_log_bprm_fcaps() 2381 ax->new_pcap.inheritable = new->cap_inheritable; in __audit_log_bprm_fcaps() 2400 context->capset.cap.inheritable = new->cap_effective; in __audit_log_capset()
|
D | audit.h | 66 kernel_cap_t inheritable; member
|
D | audit.c | 2071 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps() 2090 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps()
|
/Linux-v4.19/include/uapi/linux/ |
D | capability.h | 47 __u32 inheritable; member 76 __le32 inheritable; /* Little endian */ member 87 __le32 inheritable; /* Little endian */ member
|
/Linux-v4.19/security/ |
D | commoncap.c | 206 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 214 *inheritable = cred->cap_inheritable; in cap_capget() 251 const kernel_cap_t *inheritable, in cap_capset() argument 255 !cap_issubset(*inheritable, in cap_capset() 261 if (!cap_issubset(*inheritable, in cap_capset() 276 new->cap_inheritable = *inheritable; in cap_capset() 285 *inheritable)); in cap_capset() 552 __u32 inheritable = caps->inheritable.cap[i]; in bprm_caps_from_vfs_caps() local 560 (new->cap_inheritable.cap[i] & inheritable); in bprm_caps_from_vfs_caps() 641 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable); in get_vfs_caps_from_disk() [all …]
|
D | security.c | 270 kernel_cap_t *inheritable, in security_capget() argument 274 effective, inheritable, permitted); in security_capget() 279 const kernel_cap_t *inheritable, in security_capset() argument 283 effective, inheritable, permitted); in security_capset()
|
/Linux-v4.19/fs/btrfs/ |
D | props.c | 23 int inheritable; member 38 .inheritable = 1 304 if (!h->inheritable) in inherit_props()
|
/Linux-v4.19/include/linux/ |
D | security.h | 79 …get(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *… 82 const kernel_cap_t *inheritable, 230 kernel_cap_t *inheritable, 234 const kernel_cap_t *inheritable, 479 kernel_cap_t *inheritable, in security_capget() argument 482 return cap_capget(target, effective, inheritable, permitted); in security_capget() 488 const kernel_cap_t *inheritable, in security_capset() argument 491 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
D | capability.h | 32 kernel_cap_t inheritable; member
|
D | lsm_hooks.h | 1444 kernel_cap_t *inheritable, kernel_cap_t *permitted); 1447 const kernel_cap_t *inheritable,
|
/Linux-v4.19/Documentation/security/ |
D | credentials.rst | 149 - Set of inheritable capabilities 161 inheritable set might also be so constrained. 166 The inheritable capabilities are the ones that may get passed across
|
/Linux-v4.19/Documentation/admin-guide/mm/ |
D | numa_memory_policy.rst | 55 it is inheritable, and indeed is inherited, across both fork() 108 are NOT inheritable across exec(). Thus, only NUMA-aware
|
/Linux-v4.19/security/apparmor/ |
D | lsm.c | 144 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
|
/Linux-v4.19/security/selinux/ |
D | hooks.c | 2286 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() argument 2295 const kernel_cap_t *inheritable, in selinux_capset() argument
|
/Linux-v4.19/Documentation/filesystems/ |
D | vfs.txt | 1108 VFS mount record to provide inheritable mount parameters. NULL should
|
D | proc.txt | 266 CapInh bitmap of inheritable capabilities
|