Searched refs:kernel_cap_t (Results 1 – 17 of 17) sorted by relevance
/linux-4.1.27/include/linux/ |
D | capability.h | 25 } kernel_cap_t; typedef 30 kernel_cap_t permitted; 31 kernel_cap_t inheritable; 35 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t)) 45 extern const kernel_cap_t __cap_empty_set; 46 extern const kernel_cap_t __cap_init_eff_set; 84 # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }}) 85 # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }}) 86 # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ 89 # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ [all …]
|
D | security.h | 81 … int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, ke… 83 const kernel_cap_t *effective, 84 const kernel_cap_t *inheritable, 85 const kernel_cap_t *permitted); 1474 kernel_cap_t *effective, 1475 kernel_cap_t *inheritable, kernel_cap_t *permitted); 1478 const kernel_cap_t *effective, 1479 const kernel_cap_t *inheritable, 1480 const kernel_cap_t *permitted); 1778 kernel_cap_t *effective, [all …]
|
D | cred.h | 136 kernel_cap_t cap_inheritable; /* caps our children can inherit */ 137 kernel_cap_t cap_permitted; /* caps we're permitted */ 138 kernel_cap_t cap_effective; /* caps we can actually use */ 139 kernel_cap_t cap_bset; /* capability bounding set */
|
/linux-4.1.27/security/apparmor/include/ |
D | capability.h | 32 kernel_cap_t allow; 33 kernel_cap_t audit; 34 kernel_cap_t quiet; 35 kernel_cap_t kill; 36 kernel_cap_t extended;
|
/linux-4.1.27/kernel/ |
D | capability.c | 26 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET; 117 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid() 118 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid() 154 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2() 227 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
|
D | audit.h | 63 kernel_cap_t permitted; 64 kernel_cap_t inheritable; 67 kernel_cap_t effective; /* effective set of process */ 211 kernel_cap_t *cap);
|
D | kmod.c | 53 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 54 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 617 kernel_cap_t new_cap; in proc_cap_handler()
|
D | audit.c | 1656 void audit_log_cap(struct audit_buffer *ab, char *prefix, kernel_cap_t *cap) in audit_log_cap() 1669 kernel_cap_t *perm = &name->fcap.permitted; in audit_log_fcaps() 1670 kernel_cap_t *inh = &name->fcap.inheritable; in audit_log_fcaps()
|
/linux-4.1.27/security/ |
D | commoncap.c | 145 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 207 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() 208 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 252 const kernel_cap_t *effective, in cap_capset() 253 const kernel_cap_t *inheritable, in cap_capset() 254 const kernel_cap_t *permitted) in cap_capset()
|
D | security.c | 184 kernel_cap_t *effective, in security_capget() 185 kernel_cap_t *inheritable, in security_capget() 186 kernel_cap_t *permitted) in security_capget() 192 const kernel_cap_t *effective, in security_capset() 193 const kernel_cap_t *inheritable, in security_capset() 194 const kernel_cap_t *permitted) in security_capset()
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/ |
D | linux-curproc.c | 85 static void cfs_kernel_cap_pack(kernel_cap_t kcap, cfs_cap_t *cap) in cfs_kernel_cap_pack()
|
/linux-4.1.27/security/apparmor/ |
D | capability.c | 37 kernel_cap_t caps;
|
D | lsm.c | 116 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() 117 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
|
D | policy_unpack.c | 480 kernel_cap_t tmpcap; in unpack_profile()
|
/linux-4.1.27/fs/proc/ |
D | array.c | 288 kernel_cap_t *a) in render_cap_t() 303 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, cap_bset; in task_cap()
|
/linux-4.1.27/security/selinux/ |
D | hooks.c | 2020 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, in selinux_capget() 2021 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() 2033 const kernel_cap_t *effective, in selinux_capset() 2034 const kernel_cap_t *inheritable, in selinux_capset() 2035 const kernel_cap_t *permitted) in selinux_capset()
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 352 kernel_cap_t current_cap(void) Current's effective capabilities
|