Home
last modified time | relevance | path

Searched refs:kernel_cap_t (Results 1 – 17 of 17) sorted by relevance

/Linux-v4.19/include/linux/
Dcapability.h26 } kernel_cap_t; typedef
31 kernel_cap_t permitted;
32 kernel_cap_t inheritable;
36 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t))
45 extern const kernel_cap_t __cap_empty_set;
46 extern const kernel_cap_t __cap_init_eff_set;
84 # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }})
85 # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }})
86 # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \
89 # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \
[all …]
Dcred.h134 kernel_cap_t cap_inheritable; /* caps our children can inherit */
135 kernel_cap_t cap_permitted; /* caps we're permitted */
136 kernel_cap_t cap_effective; /* caps we can actually use */
137 kernel_cap_t cap_bset; /* capability bounding set */
138 kernel_cap_t cap_ambient; /* Ambient capability set */
Dsecurity.h79 … int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, ke…
81 const kernel_cap_t *effective,
82 const kernel_cap_t *inheritable,
83 const kernel_cap_t *permitted);
229 kernel_cap_t *effective,
230 kernel_cap_t *inheritable,
231 kernel_cap_t *permitted);
233 const kernel_cap_t *effective,
234 const kernel_cap_t *inheritable,
235 const kernel_cap_t *permitted);
[all …]
Dlsm_hooks.h1443 int (*capget)(struct task_struct *target, kernel_cap_t *effective,
1444 kernel_cap_t *inheritable, kernel_cap_t *permitted);
1446 const kernel_cap_t *effective,
1447 const kernel_cap_t *inheritable,
1448 const kernel_cap_t *permitted);
/Linux-v4.19/security/apparmor/include/
Dcapability.h33 kernel_cap_t allow;
34 kernel_cap_t audit;
35 kernel_cap_t denied;
36 kernel_cap_t quiet;
37 kernel_cap_t kill;
38 kernel_cap_t extended;
/Linux-v4.19/kernel/
Dcapability.c27 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET;
118 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid()
119 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid()
155 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2()
228 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
Daudit.h65 kernel_cap_t permitted;
66 kernel_cap_t inheritable;
69 kernel_cap_t effective; /* effective set of process */
71 kernel_cap_t ambient;
217 kernel_cap_t *cap);
Dumh.c36 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
37 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
615 kernel_cap_t new_cap; in proc_cap_handler()
Daudit.c2057 void audit_log_cap(struct audit_buffer *ab, char *prefix, kernel_cap_t *cap) in audit_log_cap()
/Linux-v4.19/security/
Dcommoncap.c143 const kernel_cap_t *caller_caps; in cap_ptrace_access_check()
205 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget()
206 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget()
250 const kernel_cap_t *effective, in cap_capset()
251 const kernel_cap_t *inheritable, in cap_capset()
252 const kernel_cap_t *permitted) in cap_capset()
Dsecurity.c269 kernel_cap_t *effective, in security_capget()
270 kernel_cap_t *inheritable, in security_capget()
271 kernel_cap_t *permitted) in security_capget()
278 const kernel_cap_t *effective, in security_capset()
279 const kernel_cap_t *inheritable, in security_capset()
280 const kernel_cap_t *permitted) in security_capset()
/Linux-v4.19/security/apparmor/
Dcapability.c38 kernel_cap_t caps;
Dlsm.c143 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, in apparmor_capget()
144 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
Dpolicy_unpack.c597 kernel_cap_t tmpcap; in unpack_profile()
/Linux-v4.19/fs/proc/
Darray.c306 kernel_cap_t *a) in render_cap_t()
321 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, in task_cap()
/Linux-v4.19/security/selinux/
Dhooks.c2285 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, in selinux_capget()
2286 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget()
2294 const kernel_cap_t *effective, in selinux_capset()
2295 const kernel_cap_t *inheritable, in selinux_capset()
2296 const kernel_cap_t *permitted) in selinux_capset()
/Linux-v4.19/Documentation/security/
Dcredentials.rst325 kernel_cap_t current_cap(void) Current's effective capabilities