kernel_cap_t 306 fs/proc/array.c kernel_cap_t *a) kernel_cap_t 321 fs/proc/array.c kernel_cap_t cap_inheritable, cap_permitted, cap_effective, kernel_cap_t 31 include/linux/capability.h kernel_cap_t permitted; kernel_cap_t 32 include/linux/capability.h kernel_cap_t inheritable; kernel_cap_t 37 include/linux/capability.h #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t)) kernel_cap_t 46 include/linux/capability.h extern const kernel_cap_t __cap_empty_set; kernel_cap_t 47 include/linux/capability.h extern const kernel_cap_t __cap_init_eff_set; kernel_cap_t 85 include/linux/capability.h # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }}) kernel_cap_t 86 include/linux/capability.h # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }}) kernel_cap_t 87 include/linux/capability.h # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ kernel_cap_t 90 include/linux/capability.h # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ kernel_cap_t 118 include/linux/capability.h static inline kernel_cap_t cap_combine(const kernel_cap_t a, kernel_cap_t 119 include/linux/capability.h const kernel_cap_t b) kernel_cap_t 121 include/linux/capability.h kernel_cap_t dest; kernel_cap_t 126 include/linux/capability.h static inline kernel_cap_t cap_intersect(const kernel_cap_t a, kernel_cap_t 127 include/linux/capability.h const kernel_cap_t b) kernel_cap_t 129 include/linux/capability.h kernel_cap_t dest; kernel_cap_t 134 include/linux/capability.h static inline kernel_cap_t cap_drop(const kernel_cap_t a, kernel_cap_t 135 include/linux/capability.h const kernel_cap_t drop) kernel_cap_t 137 include/linux/capability.h kernel_cap_t dest; kernel_cap_t 142 include/linux/capability.h static inline kernel_cap_t cap_invert(const kernel_cap_t c) kernel_cap_t 144 include/linux/capability.h kernel_cap_t dest; kernel_cap_t 149 include/linux/capability.h static inline bool cap_isclear(const kernel_cap_t a) kernel_cap_t 166 include/linux/capability.h static inline bool cap_issubset(const kernel_cap_t a, const kernel_cap_t set) kernel_cap_t 168 include/linux/capability.h kernel_cap_t dest; kernel_cap_t 175 include/linux/capability.h static inline kernel_cap_t cap_drop_fs_set(const kernel_cap_t a) kernel_cap_t 177 include/linux/capability.h const kernel_cap_t __cap_fs_set = CAP_FS_SET; kernel_cap_t 181 include/linux/capability.h static inline kernel_cap_t cap_raise_fs_set(const kernel_cap_t a, kernel_cap_t 182 include/linux/capability.h const kernel_cap_t permitted) kernel_cap_t 184 include/linux/capability.h const kernel_cap_t __cap_fs_set = CAP_FS_SET; kernel_cap_t 189 include/linux/capability.h static inline kernel_cap_t cap_drop_nfsd_set(const kernel_cap_t a) kernel_cap_t 191 include/linux/capability.h const kernel_cap_t __cap_fs_set = CAP_NFSD_SET; kernel_cap_t 195 include/linux/capability.h static inline kernel_cap_t cap_raise_nfsd_set(const kernel_cap_t a, kernel_cap_t 196 include/linux/capability.h const kernel_cap_t permitted) kernel_cap_t 198 include/linux/capability.h const kernel_cap_t __cap_nfsd_set = CAP_NFSD_SET; kernel_cap_t 129 include/linux/cred.h kernel_cap_t cap_inheritable; /* caps our children can inherit */ kernel_cap_t 130 include/linux/cred.h kernel_cap_t cap_permitted; /* caps we're permitted */ kernel_cap_t 131 include/linux/cred.h kernel_cap_t cap_effective; /* caps we can actually use */ kernel_cap_t 132 include/linux/cred.h kernel_cap_t cap_bset; /* capability bounding set */ kernel_cap_t 133 include/linux/cred.h kernel_cap_t cap_ambient; /* Ambient capability set */ kernel_cap_t 1471 include/linux/lsm_hooks.h int (*capget)(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t 1472 include/linux/lsm_hooks.h kernel_cap_t *inheritable, kernel_cap_t *permitted); kernel_cap_t 1474 include/linux/lsm_hooks.h const kernel_cap_t *effective, kernel_cap_t 1475 include/linux/lsm_hooks.h const kernel_cap_t *inheritable, kernel_cap_t 1476 include/linux/lsm_hooks.h const kernel_cap_t *permitted); kernel_cap_t 137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); kernel_cap_t 139 include/linux/security.h const kernel_cap_t *effective, kernel_cap_t 140 include/linux/security.h const kernel_cap_t *inheritable, kernel_cap_t 141 include/linux/security.h const kernel_cap_t *permitted); kernel_cap_t 262 include/linux/security.h kernel_cap_t *effective, kernel_cap_t 263 include/linux/security.h kernel_cap_t *inheritable, kernel_cap_t 264 include/linux/security.h kernel_cap_t *permitted); kernel_cap_t 266 include/linux/security.h const kernel_cap_t *effective, kernel_cap_t 267 include/linux/security.h const kernel_cap_t *inheritable, kernel_cap_t 268 include/linux/security.h const kernel_cap_t *permitted); kernel_cap_t 520 include/linux/security.h kernel_cap_t *effective, kernel_cap_t 521 include/linux/security.h kernel_cap_t *inheritable, kernel_cap_t 522 include/linux/security.h kernel_cap_t *permitted) kernel_cap_t 529 include/linux/security.h const kernel_cap_t *effective, kernel_cap_t 530 include/linux/security.h const kernel_cap_t *inheritable, kernel_cap_t 531 include/linux/security.h const kernel_cap_t *permitted) kernel_cap_t 52 kernel/audit.h kernel_cap_t permitted; kernel_cap_t 53 kernel/audit.h kernel_cap_t inheritable; kernel_cap_t 56 kernel/audit.h kernel_cap_t effective; /* effective set of process */ kernel_cap_t 58 kernel/audit.h kernel_cap_t ambient; kernel_cap_t 1162 kernel/auditsc.c kernel_cap_t *cap) kernel_cap_t 27 kernel/capability.c const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET; kernel_cap_t 116 kernel/capability.c static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, kernel_cap_t 117 kernel/capability.c kernel_cap_t *pIp, kernel_cap_t *pPp) kernel_cap_t 153 kernel/capability.c kernel_cap_t pE, pI, pP; kernel_cap_t 226 kernel/capability.c kernel_cap_t inheritable, permitted, effective; kernel_cap_t 37 kernel/umh.c static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; kernel_cap_t 38 kernel/umh.c static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; kernel_cap_t 648 kernel/umh.c kernel_cap_t new_cap; kernel_cap_t 34 security/apparmor/capability.c kernel_cap_t caps; kernel_cap_t 29 security/apparmor/include/capability.h kernel_cap_t allow; kernel_cap_t 30 security/apparmor/include/capability.h kernel_cap_t audit; kernel_cap_t 31 security/apparmor/include/capability.h kernel_cap_t denied; kernel_cap_t 32 security/apparmor/include/capability.h kernel_cap_t quiet; kernel_cap_t 33 security/apparmor/include/capability.h kernel_cap_t kill; kernel_cap_t 34 security/apparmor/include/capability.h kernel_cap_t extended; kernel_cap_t 137 security/apparmor/lsm.c static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t 138 security/apparmor/lsm.c kernel_cap_t *inheritable, kernel_cap_t *permitted) kernel_cap_t 681 security/apparmor/policy_unpack.c kernel_cap_t tmpcap; kernel_cap_t 137 security/commoncap.c const kernel_cap_t *caller_caps; kernel_cap_t 199 security/commoncap.c int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t 200 security/commoncap.c kernel_cap_t *inheritable, kernel_cap_t *permitted) kernel_cap_t 243 security/commoncap.c const kernel_cap_t *effective, kernel_cap_t 244 security/commoncap.c const kernel_cap_t *inheritable, kernel_cap_t 245 security/commoncap.c const kernel_cap_t *permitted) kernel_cap_t 707 security/security.c kernel_cap_t *effective, kernel_cap_t 708 security/security.c kernel_cap_t *inheritable, kernel_cap_t 709 security/security.c kernel_cap_t *permitted) kernel_cap_t 716 security/security.c const kernel_cap_t *effective, kernel_cap_t 717 security/security.c const kernel_cap_t *inheritable, kernel_cap_t 718 security/security.c const kernel_cap_t *permitted) kernel_cap_t 2147 security/selinux/hooks.c static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t 2148 security/selinux/hooks.c kernel_cap_t *inheritable, kernel_cap_t *permitted) kernel_cap_t 2156 security/selinux/hooks.c const kernel_cap_t *effective, kernel_cap_t 2157 security/selinux/hooks.c const kernel_cap_t *inheritable, kernel_cap_t 2158 security/selinux/hooks.c const kernel_cap_t *permitted)