Searched refs:kernel_cap_t (Results 1 – 14 of 14) sorted by relevance
| /linux/security/apparmor/include/ |
| H A D | capability.h | 29 kernel_cap_t allow; 30 kernel_cap_t audit; 31 kernel_cap_t denied; 32 kernel_cap_t quiet; 33 kernel_cap_t kill; 34 kernel_cap_t extended; 39 kernel_cap_t aa_profile_capget(struct aa_profile *profile);
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_deny_namespace.c | 8 typedef struct { unsigned long long val; } kernel_cap_t; typedef 11 kernel_cap_t cap_effective; 19 kernel_cap_t caps = cred->cap_effective; in BPF_PROG()
|
| /linux/kernel/ |
| H A D | audit.h | 57 kernel_cap_t permitted; 58 kernel_cap_t inheritable; 61 kernel_cap_t effective; /* effective set of process */ 63 kernel_cap_t ambient;
|
| H A D | umh.c | 34 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 35 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 502 kernel_cap_t new_cap, *cap; in proc_cap_handler()
|
| H A D | auditsc.c | 1295 kernel_cap_t *cap) in audit_log_cap()
|
| /linux/security/apparmor/ |
| H A D | capability.c | 194 kernel_cap_t aa_profile_capget(struct aa_profile *profile) in aa_profile_capget() 201 kernel_cap_t caps = CAP_EMPTY_SET; in aa_profile_capget()
|
| H A D | lsm.c | 164 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() 165 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() 183 kernel_cap_t allowed; in apparmor_capget()
|
| H A D | policy_unpack.c | 328 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_low() 338 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_high() 1124 kernel_cap_t tmpcap; in unpack_profile()
|
| /linux/security/ |
| H A D | commoncap.c | 168 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 230 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() 231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 274 const kernel_cap_t *effective, in cap_capset() 275 const kernel_cap_t *inheritable, in cap_capset() 276 const kernel_cap_t *permitted) in cap_capset()
|
| H A D | security.c | 587 kernel_cap_t *effective, in security_capget() 588 kernel_cap_t *inheritable, in security_capget() 589 kernel_cap_t *permitted) in security_capget() 608 const kernel_cap_t *effective, in security_capset() 609 const kernel_cap_t *inheritable, in security_capset() 610 const kernel_cap_t *permitted) in security_capset()
|
| /linux/include/linux/ |
| H A D | lsm_hook_defs.h | 39 LSM_HOOK(int, 0, capget, const struct task_struct *target, kernel_cap_t *effective, 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable, 43 const kernel_cap_t *permitted)
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 276 kernel_cap_t current_cap(void) Current's effective capabilities
|
| /linux/security/selinux/ |
| H A D | hooks.c | 2136 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective, in selinux_capget() 2137 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() 2144 const kernel_cap_t *effective, in selinux_capset() 2145 const kernel_cap_t *inheritable, in selinux_capset() 2146 const kernel_cap_t *permitted) in selinux_capset()
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 325 kernel_cap_t current_cap(void) Current's effective capabilities
|