| /linux/security/ |
| H A D | commoncap.c | 224 * @inheritable: The place to record the inheritable set 231 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 239 *inheritable = cred->cap_inheritable; in cap_capget() 246 * Determine whether the inheritable capabilities are limited to the old 265 * @inheritable: A pointer to the proposed new inheritable capabilities set 275 const kernel_cap_t *inheritable, in cap_capset() argument 279 !cap_issubset(*inheritable, in cap_capset() 282 /* incapable of using this inheritable se in cap_capset() [all...] |
| H A D | security.c | 602 * @inheritable: inheritable capability set 605 * Get the @effective, @inheritable, and @permitted capability sets for the 614 kernel_cap_t *inheritable, in security_capset() 617 return call_int_hook(capget, target, effective, inheritable, permitted); 625 * @inheritable: inheritable capability set 628 * Set the @effective, @inheritable, and @permitted capability sets for the 635 const kernel_cap_t *inheritable, in security_capable() 638 return call_int_hook(capset, new, old, effective, inheritable, 589 security_capget(const struct task_struct * target,kernel_cap_t * effective,kernel_cap_t * inheritable,kernel_cap_t * permitted) security_capget() argument 610 security_capset(struct cred * new,const struct cred * old,const kernel_cap_t * effective,const kernel_cap_t * inheritable,const kernel_cap_t * permitted) security_capset() argument [all...] |
| /linux/fs/btrfs/ |
| H A D | props.c | 32 int inheritable; member 384 .inheritable = 1 406 if (!h->inheritable) in btrfs_inode_inherit_props()
|
| /linux/kernel/ |
| H A D | auditsc.c | 1311 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps() 1442 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special() 1708 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit() 1711 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit() 1715 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit() 2211 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps() 2758 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps() 2764 ax->old_pcap.inheritable in __audit_log_bprm_fcaps() [all...] |
| H A D | audit.h | 58 kernel_cap_t inheritable; member
|
| /linux/include/linux/ |
| H A D | lsm_hook_defs.h | 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 149 - Set of inheritable capabilities 161 inheritable set might also be so constrained. 166 The inheritable capabilities are the ones that may get passed across
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | numa_memory_policy.rst | 53 it is inheritable, and indeed is inherited, across both fork() 106 are NOT inheritable across exec(). Thus, only NUMA-aware
|
| /linux/security/apparmor/ |
| H A D | lsm.c | 165 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
|
| /linux/security/selinux/ |
| H A D | hooks.c | 2161 kernel_cap_t *inheritable, kernel_cap_t *permitted) 2169 const kernel_cap_t *inheritable, in selinux_quotactl() 2137 selinux_capget(const struct task_struct * target,kernel_cap_t * effective,kernel_cap_t * inheritable,kernel_cap_t * permitted) selinux_capget() argument 2145 selinux_capset(struct cred * new,const struct cred * old,const kernel_cap_t * effective,const kernel_cap_t * inheritable,const kernel_cap_t * permitted) selinux_capset() argument
|