/kernel/linux/linux-5.10/include/linux/ |
H A D | capability.h | 26 } kernel_cap_t; typedef 31 kernel_cap_t permitted; 32 kernel_cap_t inheritable; 37 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t)) 46 extern const kernel_cap_t __cap_empty_set; 47 extern const kernel_cap_t __cap_init_eff_set; 85 # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }}) 86 # define CAP_FULL_SET ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }}) 87 # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0 \ 90 # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B [all...] |
H A D | cred.h | 129 kernel_cap_t cap_inheritable; /* caps our children can inherit */ 130 kernel_cap_t cap_permitted; /* caps we're permitted */ 131 kernel_cap_t cap_effective; /* caps we can actually use */ 132 kernel_cap_t cap_bset; /* capability bounding set */ 133 kernel_cap_t cap_ambient; /* Ambient capability set */
|
H A D | security.h | 144 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 146 const kernel_cap_t *effective, 147 const kernel_cap_t *inheritable, 148 const kernel_cap_t *permitted); 269 kernel_cap_t *effective, 270 kernel_cap_t *inheritable, 271 kernel_cap_t *permitted); 273 const kernel_cap_t *effectiv [all...] |
/kernel/linux/linux-6.6/include/linux/ |
H A D | capability.h | 24 typedef struct { u64 val; } kernel_cap_t; typedef 30 kernel_cap_t permitted; 31 kernel_cap_t inheritable; 35 #define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t)) 66 # define CAP_EMPTY_SET ((kernel_cap_t) { 0 }) 67 # define CAP_FULL_SET ((kernel_cap_t) { CAP_VALID_MASK }) 68 # define CAP_FS_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_LINUX_IMMUTABLE) }) 69 # define CAP_NFSD_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_SYS_RESOURCE) }) 77 static inline kernel_cap_t cap_combine(const kernel_cap_t [all...] |
H A D | cred.h | 121 kernel_cap_t cap_inheritable; /* caps our children can inherit */ 122 kernel_cap_t cap_permitted; /* caps we're permitted */ 123 kernel_cap_t cap_effective; /* caps we can actually use */ 124 kernel_cap_t cap_bset; /* capability bounding set */ 125 kernel_cap_t cap_ambient; /* Ambient capability set */
|
H A D | security.h | 148 extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective, 149 kernel_cap_t *inheritable, kernel_cap_t *permitted); 151 const kernel_cap_t *effective, 152 const kernel_cap_t *inheritable, 153 const kernel_cap_t *permitted); 276 kernel_cap_t *effective, 277 kernel_cap_t *inheritable, 278 kernel_cap_t *permitted); 280 const kernel_cap_t *effectiv [all...] |
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | capability.h | 29 kernel_cap_t allow; 30 kernel_cap_t audit; 31 kernel_cap_t denied; 32 kernel_cap_t quiet; 33 kernel_cap_t kill; 34 kernel_cap_t extended;
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | capability.h | 29 kernel_cap_t allow; 30 kernel_cap_t audit; 31 kernel_cap_t denied; 32 kernel_cap_t quiet; 33 kernel_cap_t kill; 34 kernel_cap_t extended;
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | test_deny_namespace.c | 8 typedef struct { unsigned long long val; } kernel_cap_t; typedef 11 kernel_cap_t cap_effective; 19 kernel_cap_t caps = cred->cap_effective; in BPF_PROG()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | capability.c | 109 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid() 110 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid() 146 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2() 197 static kernel_cap_t mk_kernel_cap(u32 low, u32 high) in mk_kernel_cap() 199 return (kernel_cap_t) { (low | ((u64)high << 32)) & CAP_VALID_MASK }; in mk_kernel_cap() 224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
|
H A D | audit.h | 56 kernel_cap_t permitted; 57 kernel_cap_t inheritable; 60 kernel_cap_t effective; /* effective set of process */ 62 kernel_cap_t ambient;
|
H A D | umh.c | 35 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 36 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 503 kernel_cap_t new_cap, *cap; in proc_cap_handler() 511 * convert from the global kernel_cap_t to the ulong array to print to in proc_cap_handler()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | capability.c | 27 const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET; 116 static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp, in cap_get_target_pid() 117 kernel_cap_t *pIp, kernel_cap_t *pPp) in cap_get_target_pid() 153 kernel_cap_t pE, pI, pP; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2()
|
H A D | audit.h | 52 kernel_cap_t permitted; 53 kernel_cap_t inheritable; 56 kernel_cap_t effective; /* effective set of process */ 58 kernel_cap_t ambient;
|
H A D | umh.c | 36 static kernel_cap_t usermodehelper_bset = CAP_FULL_SET; 37 static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET; 491 kernel_cap_t new_cap; in proc_cap_handler() 499 * convert from the global kernel_cap_t to the ulong array to print to in proc_cap_handler() 525 * convert from the sysctl array of ulongs to the kernel_cap_t in proc_cap_handler()
|
/kernel/linux/common_modules/container_escape_detection/include/ |
H A D | ced_detection_points.h | 23 kernel_cap_t cap_effective; 32 memcpy(&info->cap_effective, &cred->cap_effective, sizeof(kernel_cap_t)); in cred_info_record()
|
/kernel/linux/linux-5.10/security/ |
H A D | commoncap.c | 137 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 199 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 243 const kernel_cap_t *effective, in cap_capset() 244 const kernel_cap_t *inheritable, in cap_capset() 245 const kernel_cap_t *permitted) in cap_capset()
|
H A D | security.c | 762 kernel_cap_t *effective, in security_capget() 763 kernel_cap_t *inheritable, in security_capget() 764 kernel_cap_t *permitted) in security_capget() 771 const kernel_cap_t *effective, in security_capset() 772 const kernel_cap_t *inheritable, in security_capset() 773 const kernel_cap_t *permitted) in security_capset()
|
/kernel/linux/linux-6.6/security/ |
H A D | commoncap.c | 138 const kernel_cap_t *caller_caps; in cap_ptrace_access_check() 200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() 201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() 244 const kernel_cap_t *effective, in cap_capset() 245 const kernel_cap_t *inheritable, in cap_capset() 246 const kernel_cap_t *permitted) in cap_capset()
|
H A D | security.c | 898 kernel_cap_t *effective, in security_capget() 899 kernel_cap_t *inheritable, in security_capget() 900 kernel_cap_t *permitted) in security_capget() 920 const kernel_cap_t *effective, in security_capset() 921 const kernel_cap_t *inheritable, in security_capset() 922 const kernel_cap_t *permitted) in security_capset()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | capability.c | 34 kernel_cap_t caps;
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | capability.c | 34 kernel_cap_t caps;
|
H A D | policy_unpack.c | 311 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_low() 321 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_high() 813 kernel_cap_t tmpcap; in unpack_profile()
|
/kernel/linux/common_modules/container_escape_detection/core/ |
H A D | ced_detection.c | 146 && memcmp(&a->cap_effective, &b->cred.cap_effective, sizeof(kernel_cap_t))) in has_same_cred()
|
/kernel/linux/linux-6.6/io_uring/ |
H A D | fdinfo.c | 24 kernel_cap_t cap; in io_uring_show_cred()
|