| /linux/include/linux/ |
| A D | capability.h | 30 kernel_cap_t permitted; 31 kernel_cap_t inheritable; 77 static inline kernel_cap_t cap_combine(const kernel_cap_t a, in cap_combine() 83 static inline kernel_cap_t cap_intersect(const kernel_cap_t a, in cap_intersect() 89 static inline kernel_cap_t cap_drop(const kernel_cap_t a, in cap_drop() 100 static inline bool cap_isidentical(const kernel_cap_t a, const kernel_cap_t b) in cap_isidentical() 112 static inline bool cap_issubset(const kernel_cap_t a, const kernel_cap_t set) in cap_issubset() 119 static inline kernel_cap_t cap_drop_fs_set(const kernel_cap_t a) in cap_drop_fs_set() 124 static inline kernel_cap_t cap_raise_fs_set(const kernel_cap_t a, in cap_raise_fs_set() 130 static inline kernel_cap_t cap_drop_nfsd_set(const kernel_cap_t a) in cap_drop_nfsd_set() [all …]
|
| A D | cred.h | 122 kernel_cap_t cap_inheritable; /* caps our children can inherit */ 123 kernel_cap_t cap_permitted; /* caps we're permitted */ 124 kernel_cap_t cap_effective; /* caps we can actually use */ 125 kernel_cap_t cap_bset; /* capability bounding set */ 126 kernel_cap_t cap_ambient; /* Ambient capability set */
|
| A D | security.h | 166 kernel_cap_t *inheritable, kernel_cap_t *permitted); 168 const kernel_cap_t *effective, 170 const kernel_cap_t *permitted); 294 kernel_cap_t *effective, 295 kernel_cap_t *inheritable, 296 kernel_cap_t *permitted); 298 const kernel_cap_t *effective, 300 const kernel_cap_t *permitted); 609 kernel_cap_t *effective, in security_capget() 610 kernel_cap_t *inheritable, in security_capget() [all …]
|
| A D | lsm_hook_defs.h | 39 LSM_HOOK(int, 0, capget, const struct task_struct *target, kernel_cap_t *effective, 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable, 43 const kernel_cap_t *permitted)
|
| /linux/security/apparmor/include/ |
| A D | capability.h | 29 kernel_cap_t allow; 30 kernel_cap_t audit; 31 kernel_cap_t denied; 32 kernel_cap_t quiet; 33 kernel_cap_t kill; 34 kernel_cap_t extended;
|
| /linux/tools/testing/selftests/bpf/progs/ |
| A D | test_deny_namespace.c | 8 typedef struct { unsigned long long val; } kernel_cap_t; typedef 11 kernel_cap_t cap_effective; 19 kernel_cap_t caps = cred->cap_effective; in BPF_PROG()
|
| /linux/kernel/ |
| A D | capability.c | 109 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid() 110 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid() 146 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2() 197 static kernel_cap_t mk_kernel_cap(u32 low, u32 high) in mk_kernel_cap() 199 return (kernel_cap_t) { (low | ((u64)high << 32)) & CAP_VALID_MASK }; in mk_kernel_cap() 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
|
| A D | audit.h | 56 kernel_cap_t permitted; 57 kernel_cap_t inheritable; 60 kernel_cap_t effective; /* effective set of process */ 62 kernel_cap_t ambient;
|
| A D | umh.c | 35 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 36 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 503 kernel_cap_t new_cap, *cap; in proc_cap_handler()
|
| A D | auditsc.c | 1300 kernel_cap_t *cap) in audit_log_cap()
|
| /linux/security/ |
| A D | commoncap.c | 139 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 201 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() 202 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 245 const kernel_cap_t *effective, in cap_capset() 246 const kernel_cap_t *inheritable, in cap_capset() 247 const kernel_cap_t *permitted) in cap_capset()
|
| A D | security.c | 1096 kernel_cap_t *effective, in security_capget() 1097 kernel_cap_t *inheritable, in security_capget() 1098 kernel_cap_t *permitted) in security_capget() 1117 const kernel_cap_t *effective, in security_capset() 1118 const kernel_cap_t *inheritable, in security_capset() 1119 const kernel_cap_t *permitted) in security_capset()
|
| /linux/security/apparmor/ |
| A D | capability.c | 34 kernel_cap_t caps;
|
| A D | policy_unpack.c | 311 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_low() 321 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_high() 828 kernel_cap_t tmpcap; in unpack_profile()
|
| A D | lsm.c | 160 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() 161 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
|
| /linux/io_uring/ |
| A D | fdinfo.c | 24 kernel_cap_t cap; in io_uring_show_cred()
|
| /linux/fs/proc/ |
| A D | array.c | 304 kernel_cap_t *a) in render_cap_t() 314 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, in task_cap()
|
| /linux/security/selinux/ |
| A D | hooks.c | 2115 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective, in selinux_capget() 2116 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() 2123 const kernel_cap_t *effective, in selinux_capset() 2124 const kernel_cap_t *inheritable, in selinux_capset() 2125 const kernel_cap_t *permitted) in selinux_capset()
|
| /linux/Documentation/security/ |
| A D | credentials.rst | 325 kernel_cap_t current_cap(void) Current's effective capabilities
|