/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | cap_helpers.c | 25 *old_caps = (__u64)(data[1].effective) << 32 | data[0].effective; in cap_enable_effective() 27 if ((data[0].effective & cap0) == cap0 && in cap_enable_effective() 28 (data[1].effective & cap1) == cap1) in cap_enable_effective() 31 data[0].effective |= cap0; in cap_enable_effective() 32 data[1].effective |= cap1; in cap_enable_effective() 55 *old_caps = (__u64)(data[1].effective) << 32 | data[0].effective; in cap_disable_effective() 57 if (!(data[0].effective & cap0) && !(data[1].effective in cap_disable_effective() [all...] |
/kernel/liteos_a/testsuites/unittest/security/capability/smoke/ |
H A D | cap_test_001.cpp | 73 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SETPCAP); in TestChild() 74 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SETUID); in TestChild() 75 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_KILL); in TestChild() 76 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SYS_TIME); in TestChild() 77 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SYS_NICE); in TestChild() 91 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 99 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 107 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 115 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild() 128 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective in TestChild() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/powerpc/dexcr/ |
H A D | lsdexcr.c | 13 static unsigned int effective; variable 98 if (!(effective & mask)) in print_aspect() 101 printf("%12s %c (%d): ", aspect->name, effective & mask ? '*' : ' ', aspect->index); in print_aspect() 115 effective = dexcr | hdexcr; in main() 119 print_dexcr("Effective", effective); in main() 126 if (effective & DEXCR_PR_NPHIE) { in main()
|
/kernel/linux/linux-5.10/security/ |
H A D | commoncap.c | 44 " effective capabilities. Therefore not raising all" in warn_setuid_and_fcaps_mixed() 51 * cap_capable - Determine whether a task has a particular effective capability 58 * its effective set, returning 0 if it does, -ve if it does not. 192 * @effective: The place to record the effective set 199 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument 207 *effective = cred->cap_effective; in cap_capget() 233 * @effective: A pointer to the proposed new effective capabilities set 243 const kernel_cap_t *effective, in cap_capset() 241 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) cap_capset() argument 549 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_fcap) bprm_caps_from_vfs_caps() argument 671 get_file_caps(struct linux_binprm *bprm, struct file *file, bool *effective, bool *has_fcap) get_file_caps() argument 735 handle_privileged_root(struct linux_binprm *bprm, bool has_fcap, bool *effective, kuid_t root_uid) handle_privileged_root() argument 835 bool effective = false, has_fcap = false, is_setid; cap_bprm_creds_from_file() local [all...] |
/kernel/linux/linux-6.6/security/ |
H A D | commoncap.c | 45 " effective capabilities. Therefore not raising all" in warn_setuid_and_fcaps_mixed() 52 * cap_capable - Determine whether a task has a particular effective capability 59 * its effective set, returning 0 if it does, -ve if it does not. 193 * @effective: The place to record the effective set 200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument 208 *effective = cred->cap_effective; in cap_capget() 234 * @effective: A pointer to the proposed new effective capabilities set 244 const kernel_cap_t *effective, in cap_capset() 242 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) cap_capset() argument 586 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_fcap) bprm_caps_from_vfs_caps() argument 723 get_file_caps(struct linux_binprm *bprm, struct file *file, bool *effective, bool *has_fcap) get_file_caps() argument 788 handle_privileged_root(struct linux_binprm *bprm, bool has_fcap, bool *effective, kuid_t root_uid) handle_privileged_root() argument 890 bool effective = false, has_fcap = false, is_setid; cap_bprm_creds_from_file() local [all...] |
/kernel/linux/linux-5.10/kernel/ |
H A D | capability.c | 143 * @dataptr: pointer to struct that contains the effective, permitted, 171 kdata[i].effective = pE.cap[i]; in SYSCALL_DEFINE2() 208 * @data: pointer to struct that contains the effective, permitted, 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 250 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2() 255 effective.cap[i] = 0; in SYSCALL_DEFINE2() 261 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | capability.c | 136 * @dataptr: pointer to struct that contains the effective, permitted, 168 kdata[0].effective = pE.val; kdata[1].effective = pE.val >> 32; in SYSCALL_DEFINE2() 206 * @data: pointer to struct that contains the effective, permitted, 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 247 effective = mk_kernel_cap(kdata[0].effective, kdata[1].effective); in SYSCALL_DEFINE2() 256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | cgroup.c | 134 cgrp->bpf.effective[type], in cgroup_bpf_release() 221 /* compute a chain of effective programs for a given cgroup: 237 /* count number of effective programs by walking parents */ in compute_effective_progs() 248 /* populate the array with effective progs */ in compute_effective_progs() 275 old_array = rcu_replace_pointer(cgrp->bpf.effective[type], old_array, in activate_effective_progs() 284 * cgroup_bpf_inherit() - inherit effective programs from parent 292 #define NR ARRAY_SIZE(cgrp->bpf.effective) in cgroup_bpf_inherit() 336 /* allocate and recompute effective prog arrays */ in update_effective_progs() 367 /* oom while computing effective. Free all computed effective array in update_effective_progs() 771 struct bpf_prog_array *effective; __cgroup_bpf_query() local [all...] |
/kernel/linux/linux-5.10/arch/arm/include/debug/ |
H A D | omap2plus.S | 30 10: adr \rp, 99f @ get effective addr of 99f 34 sub \tmp, \rp, \rv @ make it effective
|
/kernel/linux/linux-6.6/arch/arm/include/debug/ |
H A D | omap2plus.S | 30 10: adr \rp, 99f @ get effective addr of 99f 34 sub \tmp, \rp, \rv @ make it effective
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | cgroup.c | 46 array = rcu_dereference(cgrp->effective[atype]); in bpf_prog_run_array_cg() 308 cgrp->bpf.effective[atype], in cgroup_bpf_release() 395 /* compute a chain of effective programs for a given cgroup: 411 /* count number of effective programs by walking parents */ in compute_effective_progs() 422 /* populate the array with effective progs */ in compute_effective_progs() 449 old_array = rcu_replace_pointer(cgrp->bpf.effective[atype], old_array, in activate_effective_progs() 458 * cgroup_bpf_inherit() - inherit effective programs from parent 466 #define NR ARRAY_SIZE(cgrp->bpf.effective) in cgroup_bpf_inherit() 510 /* allocate and recompute effective prog arrays */ in update_effective_progs() 541 /* oom while computing effective in update_effective_progs() 1029 struct bpf_prog_array *effective; __cgroup_bpf_query() local [all...] |
/kernel/linux/linux-5.10/arch/x86/mm/ |
H A D | dump_pagetables.c | 255 pgprotval_t effective; in effective_prot() local 260 effective = (higher_prot & prot & (_PAGE_USER | _PAGE_RW)) | in effective_prot() 263 effective = prot; in effective_prot() 266 st->prot_levels[level] = effective; in effective_prot()
|
/kernel/linux/linux-6.6/arch/x86/mm/ |
H A D | dump_pagetables.c | 255 pgprotval_t effective; in effective_prot() local 260 effective = (higher_prot & prot & (_PAGE_USER | _PAGE_RW)) | in effective_prot() 263 effective = prot; in effective_prot() 266 st->prot_levels[level] = effective; in effective_prot()
|
/kernel/linux/linux-6.6/tools/testing/selftests/cgroup/ |
H A D | test_cpuset_prs.sh | 115 ACTUAL_VAL=$(cat cpuset.cpus.effective) 117 echo "cpuset.cpus.effective: expect '$EXPECTED_VAL', found '$EXPECTED_VAL'" 439 # Return 1 if the list of effective cpus isn't the same as the initial list. 454 ECPUS=$DIR/cpuset.cpus.effective 462 # Check effective cpus 475 FILE=$CGRP/cpuset.cpus.effective 586 echo "Test $TEST[$I] failed effective CPU check!" 607 # Check to see if effective cpu list changes 610 NEWLIST=$(cat cpuset.cpus.effective)
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | bpf-cgroup-defs.h | 51 /* array of effective progs in this cgroup */ 52 struct bpf_prog_array __rcu *effective[MAX_CGROUP_BPF_ATTACH_TYPE]; member 65 /* temp storage for effective prog array used by prog_attach/detach */
|
H A D | security.h | 148 extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective, 151 const kernel_cap_t *effective, 276 kernel_cap_t *effective, 280 const kernel_cap_t *effective, 561 kernel_cap_t *effective, in security_capget() 565 return cap_capget(target, effective, inheritable, permitted); in security_capget() 570 const kernel_cap_t *effective, in security_capset() 574 return cap_capset(new, old, effective, inheritable, permitted); in security_capset() 560 security_capget(const struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) security_capget() argument 568 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) security_capset() argument
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | capability.h | 45 __u32 effective; member 133 /* Overrides the following restrictions that the effective user ID 135 bits on that file; that the effective group ID (or one of the 142 /* Overrides the restriction that the real or effective user ID of a 143 process sending a signal must match the real or effective user ID
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | capability.h | 45 __u32 effective; member 134 /* Overrides the following restrictions that the effective user ID 136 bits on that file; that the effective group ID (or one of the 143 /* Overrides the restriction that the real or effective user ID of a 144 process sending a signal must match the real or effective user ID
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | capability.h | 33 __u32 effective; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | capability.h | 33 __u32 effective; member
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | capability.h | 20 __u32 effective; member
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 862 * so update effective bits manually in set_admin() 865 cap->data[1].effective |= 1 << (38 /* CAP_PERFMON */ - 32); in set_admin() 866 cap->data[1].effective |= 1 << (39 /* CAP_BPF */ - 32); in set_admin() 868 cap->data[1].effective &= ~(1 << (38 - 32)); in set_admin() 869 cap->data[1].effective &= ~(1 << (39 - 32)); in set_admin() 1138 bpf_priv = cap->data[1].effective & (1 << (39/* CAP_BPF */ - 32)); in is_admin() 1139 perfmon_priv = cap->data[1].effective & (1 << (38/* CAP_PERFMON */ - 32)); in is_admin()
|
/kernel/linux/linux-5.10/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 124 cap->data[1].effective |= 1 << (40 - 32); in set_capability()
|
/kernel/linux/linux-6.6/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 124 cap->data[1].effective |= 1 << (40 - 32); in set_capability()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | security.h | 144 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 146 const kernel_cap_t *effective, 269 kernel_cap_t *effective, 273 const kernel_cap_t *effective, 536 kernel_cap_t *effective, in security_capget() 540 return cap_capget(target, effective, inheritable, permitted); in security_capget() 545 const kernel_cap_t *effective, in security_capset() 549 return cap_capset(new, old, effective, inheritable, permitted); in security_capset() 535 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) security_capget() argument 543 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) security_capset() argument
|