Home
last modified time | relevance | path

Searched refs:inheritable (Results 1 – 10 of 10) sorted by relevance

/linux/security/
H A Dcommoncap.c224 * @inheritable: The place to record the inheritable set
231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument
239 *inheritable = cred->cap_inheritable; in cap_capget()
246 * Determine whether the inheritable capabilities are limited to the old
265 * @inheritable: A pointer to the proposed new inheritable capabilities set
275 const kernel_cap_t *inheritable, in cap_capset() argument
279 !cap_issubset(*inheritable, in cap_capset()
282 /* incapable of using this inheritable se in cap_capset()
[all...]
H A Dsecurity.c602 * @inheritable: inheritable capability set
605 * Get the @effective, @inheritable, and @permitted capability sets for the
614 kernel_cap_t *inheritable, in security_capset()
617 return call_int_hook(capget, target, effective, inheritable, permitted);
625 * @inheritable: inheritable capability set
628 * Set the @effective, @inheritable, and @permitted capability sets for the
635 const kernel_cap_t *inheritable, in security_capable()
638 return call_int_hook(capset, new, old, effective, inheritable,
589 security_capget(const struct task_struct * target,kernel_cap_t * effective,kernel_cap_t * inheritable,kernel_cap_t * permitted) security_capget() argument
610 security_capset(struct cred * new,const struct cred * old,const kernel_cap_t * effective,const kernel_cap_t * inheritable,const kernel_cap_t * permitted) security_capset() argument
[all...]
/linux/fs/btrfs/
H A Dprops.c32 int inheritable; member
384 .inheritable = 1
406 if (!h->inheritable) in btrfs_inode_inherit_props()
/linux/kernel/
H A Dauditsc.c1311 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps()
1442 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special()
1708 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit()
1711 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit()
1715 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit()
2211 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps()
2758 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps()
2764 ax->old_pcap.inheritable in __audit_log_bprm_fcaps()
[all...]
H A Daudit.h58 kernel_cap_t inheritable; member
/linux/include/linux/
H A Dlsm_hook_defs.h40 kernel_cap_t *inheritable, kernel_cap_t *permitted)
42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
/linux/Documentation/security/
H A Dcredentials.rst149 - Set of inheritable capabilities
161 inheritable set might also be so constrained.
166 The inheritable capabilities are the ones that may get passed across
/linux/Documentation/admin-guide/mm/
H A Dnuma_memory_policy.rst53 it is inheritable, and indeed is inherited, across both fork()
106 are NOT inheritable across exec(). Thus, only NUMA-aware
/linux/security/apparmor/
H A Dlsm.c165 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
/linux/security/selinux/
H A Dhooks.c2161 kernel_cap_t *inheritable, kernel_cap_t *permitted)
2169 const kernel_cap_t *inheritable, in selinux_quotactl()
2137 selinux_capget(const struct task_struct * target,kernel_cap_t * effective,kernel_cap_t * inheritable,kernel_cap_t * permitted) selinux_capget() argument
2145 selinux_capset(struct cred * new,const struct cred * old,const kernel_cap_t * effective,const kernel_cap_t * inheritable,const kernel_cap_t * permitted) selinux_capset() argument