Searched refs:inheritable (Results 1 – 10 of 10) sorted by relevance
| /linux/security/ |
| H A D | commoncap.c | 224 * @inheritable: The place to record the inheritable set 231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 239 *inheritable = cred->cap_inheritable; in cap_capget() 246 * Determine whether the inheritable capabilities are limited to the old 265 * @inheritable: A pointer to the proposed new inheritable capabilities set 275 const kernel_cap_t *inheritable, in cap_capset() argument 279 !cap_issubset(*inheritable, in cap_capset() 282 /* incapable of using this inheritable se in cap_capset() [all...] |
| H A D | security.c | 576 * @inheritable: inheritable capability set 579 * Get the @effective, @inheritable, and @permitted capability sets for the 588 kernel_cap_t *inheritable, in security_capget() argument 591 return call_int_hook(capget, target, effective, inheritable, permitted); in security_capget() 599 * @inheritable: inheritable capability set 602 * Set the @effective, @inheritable, and @permitted capability sets for the 609 const kernel_cap_t *inheritable, in security_capset() argument 612 return call_int_hook(capset, new, old, effective, inheritable, in security_capset() [all...] |
| /linux/fs/btrfs/ |
| H A D | props.c | 32 int inheritable; member 384 .inheritable = 1 406 if (!h->inheritable) in btrfs_inode_inherit_props()
|
| /linux/kernel/ |
| H A D | auditsc.c | 1311 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps() 1442 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special() 1708 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit() 1711 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit() 1715 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit() 2211 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps() 2758 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps() 2764 ax->old_pcap.inheritable = old->cap_inheritable; in __audit_log_bprm_fcaps() 2769 ax->new_pcap.inheritable = new->cap_inheritable; in __audit_log_bprm_fcaps() 2789 context->capset.cap.inheritable = new->cap_effective; in __audit_log_capset()
|
| H A D | audit.h | 58 kernel_cap_t inheritable; member
|
| /linux/include/linux/ |
| H A D | lsm_hook_defs.h | 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 149 - Set of inheritable capabilities 161 inheritable set might also be so constrained. 166 The inheritable capabilities are the ones that may get passed across
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | numa_memory_policy.rst | 53 it is inheritable, and indeed is inherited, across both fork() 106 are NOT inheritable across exec(). Thus, only NUMA-aware
|
| /linux/security/apparmor/ |
| H A D | lsm.c | 165 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
|
| /linux/security/selinux/ |
| H A D | hooks.c | 2137 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() argument 2145 const kernel_cap_t *inheritable, in selinux_capset() argument
|