Home
last modified time | relevance | path

Searched refs:kernel_cap_t (Results 1 – 17 of 17) sorted by relevance

/linux-4.1.27/include/linux/
Dcapability.h25 } kernel_cap_t; typedef
30 kernel_cap_t permitted;
31 kernel_cap_t inheritable;
35 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t))
45 extern const kernel_cap_t __cap_empty_set;
46 extern const kernel_cap_t __cap_init_eff_set;
84 # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }})
85 # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }})
86 # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \
89 # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \
[all …]
Dsecurity.h81 … int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, ke…
83 const kernel_cap_t *effective,
84 const kernel_cap_t *inheritable,
85 const kernel_cap_t *permitted);
1474 kernel_cap_t *effective,
1475 kernel_cap_t *inheritable, kernel_cap_t *permitted);
1478 const kernel_cap_t *effective,
1479 const kernel_cap_t *inheritable,
1480 const kernel_cap_t *permitted);
1778 kernel_cap_t *effective,
[all …]
Dcred.h136 kernel_cap_t cap_inheritable; /* caps our children can inherit */
137 kernel_cap_t cap_permitted; /* caps we're permitted */
138 kernel_cap_t cap_effective; /* caps we can actually use */
139 kernel_cap_t cap_bset; /* capability bounding set */
/linux-4.1.27/security/apparmor/include/
Dcapability.h32 kernel_cap_t allow;
33 kernel_cap_t audit;
34 kernel_cap_t quiet;
35 kernel_cap_t kill;
36 kernel_cap_t extended;
/linux-4.1.27/kernel/
Dcapability.c26 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET;
117 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid()
118 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid()
154 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2()
227 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
Daudit.h63 kernel_cap_t permitted;
64 kernel_cap_t inheritable;
67 kernel_cap_t effective; /* effective set of process */
211 kernel_cap_t *cap);
Dkmod.c53 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
54 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
617 kernel_cap_t new_cap; in proc_cap_handler()
Daudit.c1656 void audit_log_cap(struct audit_buffer *ab, char *prefix, kernel_cap_t *cap) in audit_log_cap()
1669 kernel_cap_t *perm = &name->fcap.permitted; in audit_log_fcaps()
1670 kernel_cap_t *inh = &name->fcap.inheritable; in audit_log_fcaps()
/linux-4.1.27/security/
Dcommoncap.c145 const kernel_cap_t *caller_caps; in cap_ptrace_access_check()
207 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget()
208 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget()
252 const kernel_cap_t *effective, in cap_capset()
253 const kernel_cap_t *inheritable, in cap_capset()
254 const kernel_cap_t *permitted) in cap_capset()
Dsecurity.c184 kernel_cap_t *effective, in security_capget()
185 kernel_cap_t *inheritable, in security_capget()
186 kernel_cap_t *permitted) in security_capget()
192 const kernel_cap_t *effective, in security_capset()
193 const kernel_cap_t *inheritable, in security_capset()
194 const kernel_cap_t *permitted) in security_capset()
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/
Dlinux-curproc.c85 static void cfs_kernel_cap_pack(kernel_cap_t kcap, cfs_cap_t *cap) in cfs_kernel_cap_pack()
/linux-4.1.27/security/apparmor/
Dcapability.c37 kernel_cap_t caps;
Dlsm.c116 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, in apparmor_capget()
117 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
Dpolicy_unpack.c480 kernel_cap_t tmpcap; in unpack_profile()
/linux-4.1.27/fs/proc/
Darray.c288 kernel_cap_t *a) in render_cap_t()
303 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, cap_bset; in task_cap()
/linux-4.1.27/security/selinux/
Dhooks.c2020 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, in selinux_capget()
2021 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget()
2033 const kernel_cap_t *effective, in selinux_capset()
2034 const kernel_cap_t *inheritable, in selinux_capset()
2035 const kernel_cap_t *permitted) in selinux_capset()
/linux-4.1.27/Documentation/security/
Dcredentials.txt352 kernel_cap_t current_cap(void) Current's effective capabilities