Searched refs:kernel_cap_t (Results 1 – 18 of 18) sorted by relevance
/Linux-v5.15/include/linux/ |
D | capability.h | 26 } kernel_cap_t; typedef 31 kernel_cap_t permitted; 32 kernel_cap_t inheritable; 37 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t)) 46 extern const kernel_cap_t __cap_empty_set; 47 extern const kernel_cap_t __cap_init_eff_set; 85 # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }}) 86 # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }}) 87 # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ 90 # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ [all …]
|
D | cred.h | 128 kernel_cap_t cap_inheritable; /* caps our children can inherit */ 129 kernel_cap_t cap_permitted; /* caps we're permitted */ 130 kernel_cap_t cap_effective; /* caps we can actually use */ 131 kernel_cap_t cap_bset; /* capability bounding set */ 132 kernel_cap_t cap_ambient; /* Ambient capability set */
|
D | security.h | 143 … int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, ke… 145 const kernel_cap_t *effective, 146 const kernel_cap_t *inheritable, 147 const kernel_cap_t *permitted); 271 kernel_cap_t *effective, 272 kernel_cap_t *inheritable, 273 kernel_cap_t *permitted); 275 const kernel_cap_t *effective, 276 const kernel_cap_t *inheritable, 277 const kernel_cap_t *permitted); [all …]
|
D | lsm_hook_defs.h | 39 LSM_HOOK(int, 0, capget, struct task_struct *target, kernel_cap_t *effective, 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable, 43 const kernel_cap_t *permitted)
|
/Linux-v5.15/security/apparmor/include/ |
D | capability.h | 29 kernel_cap_t allow; 30 kernel_cap_t audit; 31 kernel_cap_t denied; 32 kernel_cap_t quiet; 33 kernel_cap_t kill; 34 kernel_cap_t extended;
|
/Linux-v5.15/kernel/ |
D | capability.c | 27 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET; 116 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid() 117 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid() 153 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
|
D | audit.h | 55 kernel_cap_t permitted; 56 kernel_cap_t inheritable; 59 kernel_cap_t effective; /* effective set of process */ 61 kernel_cap_t ambient;
|
D | umh.c | 37 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 38 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 493 kernel_cap_t new_cap; in proc_cap_handler()
|
D | auditsc.c | 1196 kernel_cap_t *cap) in audit_log_cap()
|
/Linux-v5.15/security/ |
D | commoncap.c | 137 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 199 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 243 const kernel_cap_t *effective, in cap_capset() 244 const kernel_cap_t *inheritable, in cap_capset() 245 const kernel_cap_t *permitted) in cap_capset()
|
D | security.c | 784 kernel_cap_t *effective, in security_capget() 785 kernel_cap_t *inheritable, in security_capget() 786 kernel_cap_t *permitted) in security_capget() 793 const kernel_cap_t *effective, in security_capset() 794 const kernel_cap_t *inheritable, in security_capset() 795 const kernel_cap_t *permitted) in security_capset()
|
/Linux-v5.15/security/apparmor/ |
D | capability.c | 34 kernel_cap_t caps;
|
D | lsm.c | 147 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() 148 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
|
D | policy_unpack.c | 684 kernel_cap_t tmpcap; in unpack_profile()
|
/Linux-v5.15/fs/proc/ |
D | array.c | 296 kernel_cap_t *a) in render_cap_t() 311 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, in task_cap()
|
/Linux-v5.15/security/selinux/ |
D | hooks.c | 2164 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, in selinux_capget() 2165 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() 2173 const kernel_cap_t *effective, in selinux_capset() 2174 const kernel_cap_t *inheritable, in selinux_capset() 2175 const kernel_cap_t *permitted) in selinux_capset()
|
/Linux-v5.15/Documentation/security/ |
D | credentials.rst | 325 kernel_cap_t current_cap(void) Current's effective capabilities
|
/Linux-v5.15/fs/ |
D | io_uring.c | 10035 kernel_cap_t cap; in io_uring_show_cred()
|