Home
last modified time | relevance | path

Searched refs:kernel_cap_t (Results 1 – 19 of 19) sorted by relevance

/openbmc/linux/include/linux/
H A Dcapability.h24 typedef struct { u64 val; } kernel_cap_t; typedef
30 kernel_cap_t permitted;
31 kernel_cap_t inheritable;
35 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t))
66 # define CAP_EMPTY_SET ((kernel_cap_t) { 0 })
67 # define CAP_FULL_SET ((kernel_cap_t) { CAP_VALID_MASK })
68 # define CAP_FS_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_LINUX_IMMUTABLE) })
69 # define CAP_NFSD_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_SYS_RESOURCE) })
77 static inline kernel_cap_t cap_combine(const kernel_cap_t a, in cap_combine()
78 const kernel_cap_t b) in cap_combine()
[all …]
H A Dcred.h121 kernel_cap_t cap_inheritable; /* caps our children can inherit */
122 kernel_cap_t cap_permitted; /* caps we're permitted */
123 kernel_cap_t cap_effective; /* caps we can actually use */
124 kernel_cap_t cap_bset; /* capability bounding set */
125 kernel_cap_t cap_ambient; /* Ambient capability set */
H A Dsecurity.h148 extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective,
149 kernel_cap_t *inheritable, kernel_cap_t *permitted);
151 const kernel_cap_t *effective,
152 const kernel_cap_t *inheritable,
153 const kernel_cap_t *permitted);
276 kernel_cap_t *effective,
277 kernel_cap_t *inheritable,
278 kernel_cap_t *permitted);
280 const kernel_cap_t *effective,
281 const kernel_cap_t *inheritable,
[all …]
H A Dlsm_hook_defs.h39 LSM_HOOK(int, 0, capget, const struct task_struct *target, kernel_cap_t *effective,
40 kernel_cap_t *inheritable, kernel_cap_t *permitted)
42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
43 const kernel_cap_t *permitted)
/openbmc/linux/security/apparmor/include/
H A Dcapability.h29 kernel_cap_t allow;
30 kernel_cap_t audit;
31 kernel_cap_t denied;
32 kernel_cap_t quiet;
33 kernel_cap_t kill;
34 kernel_cap_t extended;
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dtest_deny_namespace.c8 typedef struct { unsigned long long val; } kernel_cap_t; typedef
11 kernel_cap_t cap_effective;
19 kernel_cap_t caps = cred->cap_effective; in BPF_PROG()
/openbmc/linux/kernel/
H A Dcapability.c109 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid()
110 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid()
146 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2()
197 static kernel_cap_t mk_kernel_cap(u32 low, u32 high) in mk_kernel_cap()
199 return (kernel_cap_t) { (low | ((u64)high << 32)) & CAP_VALID_MASK }; in mk_kernel_cap()
224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
H A Daudit.h56 kernel_cap_t permitted;
57 kernel_cap_t inheritable;
60 kernel_cap_t effective; /* effective set of process */
62 kernel_cap_t ambient;
H A Dumh.c35 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
36 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
503 kernel_cap_t new_cap, *cap; in proc_cap_handler()
H A Dauditsc.c1300 kernel_cap_t *cap) in audit_log_cap()
/openbmc/linux/security/
H A Dcommoncap.c138 const kernel_cap_t *caller_caps; in cap_ptrace_access_check()
200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget()
201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget()
244 const kernel_cap_t *effective, in cap_capset()
245 const kernel_cap_t *inheritable, in cap_capset()
246 const kernel_cap_t *permitted) in cap_capset()
H A Dsecurity.c898 kernel_cap_t *effective, in security_capget()
899 kernel_cap_t *inheritable, in security_capget()
900 kernel_cap_t *permitted) in security_capget()
920 const kernel_cap_t *effective, in security_capset()
921 const kernel_cap_t *inheritable, in security_capset()
922 const kernel_cap_t *permitted) in security_capset()
/openbmc/linux/security/apparmor/
H A Dcapability.c34 kernel_cap_t caps;
H A Dpolicy_unpack.c311 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_low()
321 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_high()
813 kernel_cap_t tmpcap; in unpack_profile()
H A Dlsm.c152 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective, in apparmor_capget()
153 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget()
/openbmc/linux/io_uring/
H A Dfdinfo.c24 kernel_cap_t cap; in io_uring_show_cred()
/openbmc/linux/fs/proc/
H A Darray.c304 kernel_cap_t *a) in render_cap_t()
314 kernel_cap_t cap_inheritable, cap_permitted, cap_effective, in task_cap()
/openbmc/linux/security/selinux/
H A Dhooks.c2108 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective, in selinux_capget()
2109 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget()
2116 const kernel_cap_t *effective, in selinux_capset()
2117 const kernel_cap_t *inheritable, in selinux_capset()
2118 const kernel_cap_t *permitted) in selinux_capset()
/openbmc/linux/Documentation/security/
H A Dcredentials.rst325 kernel_cap_t current_cap(void) Current's effective capabilities