Searched refs:kernel_cap_t (Results  1 – 18 of 18) sorted by relevance
| /Linux-v5.10/include/linux/ | 
| D | capability.h | 26 } kernel_cap_t;  typedef31 	kernel_cap_t permitted;
 32 	kernel_cap_t inheritable;
 37 #define _KERNEL_CAP_T_SIZE     (sizeof(kernel_cap_t))
 46 extern const kernel_cap_t __cap_empty_set;
 47 extern const kernel_cap_t __cap_init_eff_set;
 85 # define CAP_EMPTY_SET    ((kernel_cap_t){{ 0, 0 }})
 86 # define CAP_FULL_SET     ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }})
 87 # define CAP_FS_SET       ((kernel_cap_t){{ CAP_FS_MASK_B0 \
 90 # define CAP_NFSD_SET     ((kernel_cap_t){{ CAP_FS_MASK_B0 \
 [all …]
 
 | 
| D | cred.h | 129 	kernel_cap_t	cap_inheritable; /* caps our children can inherit */130 	kernel_cap_t	cap_permitted;	/* caps we're permitted */
 131 	kernel_cap_t	cap_effective;	/* caps we can actually use */
 132 	kernel_cap_t	cap_bset;	/* capability bounding set */
 133 	kernel_cap_t	cap_ambient;	/* Ambient capability set */
 
 | 
| D | security.h | 141 … int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, ke…143 		      const kernel_cap_t *effective,
 144 		      const kernel_cap_t *inheritable,
 145 		      const kernel_cap_t *permitted);
 266 		    kernel_cap_t *effective,
 267 		    kernel_cap_t *inheritable,
 268 		    kernel_cap_t *permitted);
 270 		    const kernel_cap_t *effective,
 271 		    const kernel_cap_t *inheritable,
 272 		    const kernel_cap_t *permitted);
 [all …]
 
 | 
| D | lsm_hook_defs.h | 39 LSM_HOOK(int, 0, capget, struct task_struct *target, kernel_cap_t *effective,40 	 kernel_cap_t *inheritable, kernel_cap_t *permitted)
 42 	 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
 43 	 const kernel_cap_t *permitted)
 
 | 
| /Linux-v5.10/security/apparmor/include/ | 
| D | capability.h | 29 	kernel_cap_t allow;30 	kernel_cap_t audit;
 31 	kernel_cap_t denied;
 32 	kernel_cap_t quiet;
 33 	kernel_cap_t kill;
 34 	kernel_cap_t extended;
 
 | 
| /Linux-v5.10/kernel/ | 
| D | capability.c | 27 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET;116 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp,  in cap_get_target_pid()
 117 				     kernel_cap_t *pIp, kernel_cap_t *pPp)  in cap_get_target_pid()
 153 	kernel_cap_t pE, pI, pP;  in SYSCALL_DEFINE2()
 226 	kernel_cap_t inheritable, permitted, effective;  in SYSCALL_DEFINE2()
 
 | 
| D | audit.h | 52 	kernel_cap_t		permitted;53 	kernel_cap_t		inheritable;
 56 		kernel_cap_t	effective;	/* effective set of process */
 58 	kernel_cap_t		ambient;
 
 | 
| D | umh.c | 36 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;37 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
 491 	kernel_cap_t new_cap;  in proc_cap_handler()
 
 | 
| D | auditsc.c | 1191 			  kernel_cap_t *cap)  in audit_log_cap()
 | 
| /Linux-v5.10/security/ | 
| D | commoncap.c | 137 	const kernel_cap_t *caller_caps;  in cap_ptrace_access_check()199 int cap_capget(struct task_struct *target, kernel_cap_t *effective,  in cap_capget()
 200 	       kernel_cap_t *inheritable, kernel_cap_t *permitted)  in cap_capget()
 243 	       const kernel_cap_t *effective,  in cap_capset()
 244 	       const kernel_cap_t *inheritable,  in cap_capset()
 245 	       const kernel_cap_t *permitted)  in cap_capset()
 
 | 
| D | security.c | 759 		     kernel_cap_t *effective,  in security_capget()760 		     kernel_cap_t *inheritable,  in security_capget()
 761 		     kernel_cap_t *permitted)  in security_capget()
 768 		    const kernel_cap_t *effective,  in security_capset()
 769 		    const kernel_cap_t *inheritable,  in security_capset()
 770 		    const kernel_cap_t *permitted)  in security_capset()
 
 | 
| /Linux-v5.10/security/apparmor/ | 
| D | capability.c | 34 	kernel_cap_t caps;
 | 
| D | lsm.c | 147 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective,  in apparmor_capget()148 			   kernel_cap_t *inheritable, kernel_cap_t *permitted)  in apparmor_capget()
 
 | 
| D | policy_unpack.c | 684 	kernel_cap_t tmpcap;  in unpack_profile()
 | 
| /Linux-v5.10/fs/proc/ | 
| D | array.c | 305 			kernel_cap_t *a)  in render_cap_t()320 	kernel_cap_t cap_inheritable, cap_permitted, cap_effective,  in task_cap()
 
 | 
| /Linux-v5.10/security/selinux/ | 
| D | hooks.c | 2101 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective,  in selinux_capget()2102 			  kernel_cap_t *inheritable, kernel_cap_t *permitted)  in selinux_capget()
 2110 			  const kernel_cap_t *effective,  in selinux_capset()
 2111 			  const kernel_cap_t *inheritable,  in selinux_capset()
 2112 			  const kernel_cap_t *permitted)  in selinux_capset()
 
 | 
| /Linux-v5.10/Documentation/security/ | 
| D | credentials.rst | 325 	kernel_cap_t current_cap(void)	Current's effective capabilities
 | 
| /Linux-v5.10/fs/ | 
| D | io_uring.c | 9022 	kernel_cap_t cap;  in io_uring_show_cred()
 |