| /Linux-v6.6/include/linux/ | 
| D | capability.h | 24 typedef struct { u64 val; } kernel_cap_t;  typedef30 	kernel_cap_t permitted;
 31 	kernel_cap_t inheritable;
 35 #define _KERNEL_CAP_T_SIZE     (sizeof(kernel_cap_t))
 66 # define CAP_EMPTY_SET    ((kernel_cap_t) { 0 })
 67 # define CAP_FULL_SET     ((kernel_cap_t) { CAP_VALID_MASK })
 68 # define CAP_FS_SET       ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_LINUX_IMMUTABLE) })
 69 # define CAP_NFSD_SET     ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_SYS_RESOURCE) })
 77 static inline kernel_cap_t cap_combine(const kernel_cap_t a,  in cap_combine()
 78 				       const kernel_cap_t b)  in cap_combine()
 [all …]
 
 | 
| D | cred.h | 128 	kernel_cap_t	cap_inheritable; /* caps our children can inherit */129 	kernel_cap_t	cap_permitted;	/* caps we're permitted */
 130 	kernel_cap_t	cap_effective;	/* caps we can actually use */
 131 	kernel_cap_t	cap_bset;	/* capability bounding set */
 132 	kernel_cap_t	cap_ambient;	/* Ambient capability set */
 
 | 
| D | security.h | 148 extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective,149 		      kernel_cap_t *inheritable, kernel_cap_t *permitted);
 151 		      const kernel_cap_t *effective,
 152 		      const kernel_cap_t *inheritable,
 153 		      const kernel_cap_t *permitted);
 276 		    kernel_cap_t *effective,
 277 		    kernel_cap_t *inheritable,
 278 		    kernel_cap_t *permitted);
 280 		    const kernel_cap_t *effective,
 281 		    const kernel_cap_t *inheritable,
 [all …]
 
 | 
| D | lsm_hook_defs.h | 39 LSM_HOOK(int, 0, capget, const struct task_struct *target, kernel_cap_t *effective,40 	 kernel_cap_t *inheritable, kernel_cap_t *permitted)
 42 	 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
 43 	 const kernel_cap_t *permitted)
 
 | 
| /Linux-v6.6/security/apparmor/include/ | 
| D | capability.h | 29 	kernel_cap_t allow;30 	kernel_cap_t audit;
 31 	kernel_cap_t denied;
 32 	kernel_cap_t quiet;
 33 	kernel_cap_t kill;
 34 	kernel_cap_t extended;
 
 | 
| /Linux-v6.6/tools/testing/selftests/bpf/progs/ | 
| D | test_deny_namespace.c | 8 typedef struct { unsigned long long val; } kernel_cap_t;  typedef11 	kernel_cap_t cap_effective;
 19 	kernel_cap_t caps = cred->cap_effective;  in BPF_PROG()
 
 | 
| /Linux-v6.6/kernel/ | 
| D | capability.c | 109 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp,  in cap_get_target_pid()110 				     kernel_cap_t *pIp, kernel_cap_t *pPp)  in cap_get_target_pid()
 146 	kernel_cap_t pE, pI, pP;  in SYSCALL_DEFINE2()
 197 static kernel_cap_t mk_kernel_cap(u32 low, u32 high)  in mk_kernel_cap()
 199 	return (kernel_cap_t) { (low | ((u64)high << 32)) & CAP_VALID_MASK };  in mk_kernel_cap()
 224 	kernel_cap_t inheritable, permitted, effective;  in SYSCALL_DEFINE2()
 
 | 
| D | audit.h | 56 	kernel_cap_t		permitted;57 	kernel_cap_t		inheritable;
 60 		kernel_cap_t	effective;	/* effective set of process */
 62 	kernel_cap_t		ambient;
 
 | 
| D | umh.c | 35 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;36 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
 503 	kernel_cap_t new_cap, *cap;  in proc_cap_handler()
 
 | 
| D | auditsc.c | 1300 			  kernel_cap_t *cap)  in audit_log_cap()
 | 
| /Linux-v6.6/security/ | 
| D | commoncap.c | 138 	const kernel_cap_t *caller_caps;  in cap_ptrace_access_check()200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective,  in cap_capget()
 201 	       kernel_cap_t *inheritable, kernel_cap_t *permitted)  in cap_capget()
 244 	       const kernel_cap_t *effective,  in cap_capset()
 245 	       const kernel_cap_t *inheritable,  in cap_capset()
 246 	       const kernel_cap_t *permitted)  in cap_capset()
 
 | 
| D | security.c | 898 		    kernel_cap_t *effective,  in security_capget()899 		    kernel_cap_t *inheritable,  in security_capget()
 900 		    kernel_cap_t *permitted)  in security_capget()
 920 		    const kernel_cap_t *effective,  in security_capset()
 921 		    const kernel_cap_t *inheritable,  in security_capset()
 922 		    const kernel_cap_t *permitted)  in security_capset()
 
 | 
| /Linux-v6.6/security/apparmor/ | 
| D | capability.c | 34 	kernel_cap_t caps;
 | 
| D | policy_unpack.c | 310 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name)  in aa_unpack_cap_low()320 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name)  in aa_unpack_cap_high()
 813 	kernel_cap_t tmpcap;  in unpack_profile()
 
 | 
| D | lsm.c | 147 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective,  in apparmor_capget()148 			   kernel_cap_t *inheritable, kernel_cap_t *permitted)  in apparmor_capget()
 
 | 
| /Linux-v6.6/io_uring/ | 
| D | fdinfo.c | 24 	kernel_cap_t cap;  in io_uring_show_cred()
 | 
| /Linux-v6.6/fs/proc/ | 
| D | array.c | 304 			kernel_cap_t *a)  in render_cap_t()314 	kernel_cap_t cap_inheritable, cap_permitted, cap_effective,  in task_cap()
 
 | 
| /Linux-v6.6/security/selinux/ | 
| D | hooks.c | 2110 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective,  in selinux_capget()2111 			  kernel_cap_t *inheritable, kernel_cap_t *permitted)  in selinux_capget()
 2118 			  const kernel_cap_t *effective,  in selinux_capset()
 2119 			  const kernel_cap_t *inheritable,  in selinux_capset()
 2120 			  const kernel_cap_t *permitted)  in selinux_capset()
 
 | 
| /Linux-v6.6/Documentation/security/ | 
| D | credentials.rst | 325 	kernel_cap_t current_cap(void)	Current's effective capabilities
 |