Home
last modified time | relevance | path

Searched refs:effective (Results 1 - 25 of 48) sorted by relevance

12

/kernel/linux/linux-6.6/tools/testing/selftests/bpf/
H A Dcap_helpers.c25 *old_caps = (__u64)(data[1].effective) << 32 | data[0].effective; in cap_enable_effective()
27 if ((data[0].effective & cap0) == cap0 && in cap_enable_effective()
28 (data[1].effective & cap1) == cap1) in cap_enable_effective()
31 data[0].effective |= cap0; in cap_enable_effective()
32 data[1].effective |= cap1; in cap_enable_effective()
55 *old_caps = (__u64)(data[1].effective) << 32 | data[0].effective; in cap_disable_effective()
57 if (!(data[0].effective & cap0) && !(data[1].effective in cap_disable_effective()
[all...]
/kernel/liteos_a/testsuites/unittest/security/capability/smoke/
H A Dcap_test_001.cpp73 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SETPCAP); in TestChild()
74 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SETUID); in TestChild()
75 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_KILL); in TestChild()
76 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SYS_TIME); in TestChild()
77 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective |= CAP_TO_MASK(CAP_SYS_NICE); in TestChild()
91 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
99 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
107 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
115 printf("e %d,p %d\n", capdatac[0].effective, capdatac[0].permitted); in TestChild()
128 capdata[CAP_TO_INDEX(CAP_SYS_NICE)].effective in TestChild()
[all...]
/kernel/linux/linux-6.6/tools/testing/selftests/powerpc/dexcr/
H A Dlsdexcr.c13 static unsigned int effective; variable
98 if (!(effective & mask)) in print_aspect()
101 printf("%12s %c (%d): ", aspect->name, effective & mask ? '*' : ' ', aspect->index); in print_aspect()
115 effective = dexcr | hdexcr; in main()
119 print_dexcr("Effective", effective); in main()
126 if (effective & DEXCR_PR_NPHIE) { in main()
/kernel/linux/linux-5.10/security/
H A Dcommoncap.c44 " effective capabilities. Therefore not raising all" in warn_setuid_and_fcaps_mixed()
51 * cap_capable - Determine whether a task has a particular effective capability
58 * its effective set, returning 0 if it does, -ve if it does not.
192 * @effective: The place to record the effective set
199 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument
207 *effective = cred->cap_effective; in cap_capget()
233 * @effective: A pointer to the proposed new effective capabilities set
243 const kernel_cap_t *effective, in cap_capset()
241 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) cap_capset() argument
549 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_fcap) bprm_caps_from_vfs_caps() argument
671 get_file_caps(struct linux_binprm *bprm, struct file *file, bool *effective, bool *has_fcap) get_file_caps() argument
735 handle_privileged_root(struct linux_binprm *bprm, bool has_fcap, bool *effective, kuid_t root_uid) handle_privileged_root() argument
835 bool effective = false, has_fcap = false, is_setid; cap_bprm_creds_from_file() local
[all...]
/kernel/linux/linux-6.6/security/
H A Dcommoncap.c45 " effective capabilities. Therefore not raising all" in warn_setuid_and_fcaps_mixed()
52 * cap_capable - Determine whether a task has a particular effective capability
59 * its effective set, returning 0 if it does, -ve if it does not.
193 * @effective: The place to record the effective set
200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument
208 *effective = cred->cap_effective; in cap_capget()
234 * @effective: A pointer to the proposed new effective capabilities set
244 const kernel_cap_t *effective, in cap_capset()
242 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) cap_capset() argument
586 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_fcap) bprm_caps_from_vfs_caps() argument
723 get_file_caps(struct linux_binprm *bprm, struct file *file, bool *effective, bool *has_fcap) get_file_caps() argument
788 handle_privileged_root(struct linux_binprm *bprm, bool has_fcap, bool *effective, kuid_t root_uid) handle_privileged_root() argument
890 bool effective = false, has_fcap = false, is_setid; cap_bprm_creds_from_file() local
[all...]
/kernel/linux/linux-5.10/kernel/
H A Dcapability.c143 * @dataptr: pointer to struct that contains the effective, permitted,
171 kdata[i].effective = pE.cap[i]; in SYSCALL_DEFINE2()
208 * @data: pointer to struct that contains the effective, permitted,
226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
250 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2()
255 effective.cap[i] = 0; in SYSCALL_DEFINE2()
261 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
/kernel/linux/linux-6.6/kernel/
H A Dcapability.c136 * @dataptr: pointer to struct that contains the effective, permitted,
168 kdata[0].effective = pE.val; kdata[1].effective = pE.val >> 32; in SYSCALL_DEFINE2()
206 * @data: pointer to struct that contains the effective, permitted,
224 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
247 effective = mk_kernel_cap(kdata[0].effective, kdata[1].effective); in SYSCALL_DEFINE2()
256 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
/kernel/linux/linux-5.10/kernel/bpf/
H A Dcgroup.c134 cgrp->bpf.effective[type], in cgroup_bpf_release()
221 /* compute a chain of effective programs for a given cgroup:
237 /* count number of effective programs by walking parents */ in compute_effective_progs()
248 /* populate the array with effective progs */ in compute_effective_progs()
275 old_array = rcu_replace_pointer(cgrp->bpf.effective[type], old_array, in activate_effective_progs()
284 * cgroup_bpf_inherit() - inherit effective programs from parent
292 #define NR ARRAY_SIZE(cgrp->bpf.effective) in cgroup_bpf_inherit()
336 /* allocate and recompute effective prog arrays */ in update_effective_progs()
367 /* oom while computing effective. Free all computed effective array in update_effective_progs()
771 struct bpf_prog_array *effective; __cgroup_bpf_query() local
[all...]
/kernel/linux/linux-5.10/arch/arm/include/debug/
H A Domap2plus.S30 10: adr \rp, 99f @ get effective addr of 99f
34 sub \tmp, \rp, \rv @ make it effective
/kernel/linux/linux-6.6/arch/arm/include/debug/
H A Domap2plus.S30 10: adr \rp, 99f @ get effective addr of 99f
34 sub \tmp, \rp, \rv @ make it effective
/kernel/linux/linux-6.6/kernel/bpf/
H A Dcgroup.c46 array = rcu_dereference(cgrp->effective[atype]); in bpf_prog_run_array_cg()
308 cgrp->bpf.effective[atype], in cgroup_bpf_release()
395 /* compute a chain of effective programs for a given cgroup:
411 /* count number of effective programs by walking parents */ in compute_effective_progs()
422 /* populate the array with effective progs */ in compute_effective_progs()
449 old_array = rcu_replace_pointer(cgrp->bpf.effective[atype], old_array, in activate_effective_progs()
458 * cgroup_bpf_inherit() - inherit effective programs from parent
466 #define NR ARRAY_SIZE(cgrp->bpf.effective) in cgroup_bpf_inherit()
510 /* allocate and recompute effective prog arrays */ in update_effective_progs()
541 /* oom while computing effective in update_effective_progs()
1029 struct bpf_prog_array *effective; __cgroup_bpf_query() local
[all...]
/kernel/linux/linux-5.10/arch/x86/mm/
H A Ddump_pagetables.c255 pgprotval_t effective; in effective_prot() local
260 effective = (higher_prot & prot & (_PAGE_USER | _PAGE_RW)) | in effective_prot()
263 effective = prot; in effective_prot()
266 st->prot_levels[level] = effective; in effective_prot()
/kernel/linux/linux-6.6/arch/x86/mm/
H A Ddump_pagetables.c255 pgprotval_t effective; in effective_prot() local
260 effective = (higher_prot & prot & (_PAGE_USER | _PAGE_RW)) | in effective_prot()
263 effective = prot; in effective_prot()
266 st->prot_levels[level] = effective; in effective_prot()
/kernel/linux/linux-6.6/tools/testing/selftests/cgroup/
H A Dtest_cpuset_prs.sh115 ACTUAL_VAL=$(cat cpuset.cpus.effective)
117 echo "cpuset.cpus.effective: expect '$EXPECTED_VAL', found '$EXPECTED_VAL'"
439 # Return 1 if the list of effective cpus isn't the same as the initial list.
454 ECPUS=$DIR/cpuset.cpus.effective
462 # Check effective cpus
475 FILE=$CGRP/cpuset.cpus.effective
586 echo "Test $TEST[$I] failed effective CPU check!"
607 # Check to see if effective cpu list changes
610 NEWLIST=$(cat cpuset.cpus.effective)
/kernel/linux/linux-6.6/include/linux/
H A Dbpf-cgroup-defs.h51 /* array of effective progs in this cgroup */
52 struct bpf_prog_array __rcu *effective[MAX_CGROUP_BPF_ATTACH_TYPE]; member
65 /* temp storage for effective prog array used by prog_attach/detach */
H A Dsecurity.h148 extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective,
151 const kernel_cap_t *effective,
276 kernel_cap_t *effective,
280 const kernel_cap_t *effective,
561 kernel_cap_t *effective, in security_capget()
565 return cap_capget(target, effective, inheritable, permitted); in security_capget()
570 const kernel_cap_t *effective, in security_capset()
574 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
560 security_capget(const struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) security_capget() argument
568 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) security_capset() argument
/kernel/linux/linux-5.10/include/uapi/linux/
H A Dcapability.h45 __u32 effective; member
133 /* Overrides the following restrictions that the effective user ID
135 bits on that file; that the effective group ID (or one of the
142 /* Overrides the restriction that the real or effective user ID of a
143 process sending a signal must match the real or effective user ID
/kernel/linux/linux-6.6/include/uapi/linux/
H A Dcapability.h45 __u32 effective; member
134 /* Overrides the following restrictions that the effective user ID
136 bits on that file; that the effective group ID (or one of the
143 /* Overrides the restriction that the real or effective user ID of a
144 process sending a signal must match the real or effective user ID
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/
H A Dcapability.h33 __u32 effective; member
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/
H A Dcapability.h33 __u32 effective; member
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/
H A Dcapability.h20 __u32 effective; member
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
H A Dtest_verifier.c862 * so update effective bits manually in set_admin()
865 cap->data[1].effective |= 1 << (38 /* CAP_PERFMON */ - 32); in set_admin()
866 cap->data[1].effective |= 1 << (39 /* CAP_BPF */ - 32); in set_admin()
868 cap->data[1].effective &= ~(1 << (38 - 32)); in set_admin()
869 cap->data[1].effective &= ~(1 << (39 - 32)); in set_admin()
1138 bpf_priv = cap->data[1].effective & (1 << (39/* CAP_BPF */ - 32)); in is_admin()
1139 perfmon_priv = cap->data[1].effective & (1 << (38/* CAP_PERFMON */ - 32)); in is_admin()
/kernel/linux/linux-5.10/tools/testing/selftests/clone3/
H A Dclone3_cap_checkpoint_restore.c124 cap->data[1].effective |= 1 << (40 - 32); in set_capability()
/kernel/linux/linux-6.6/tools/testing/selftests/clone3/
H A Dclone3_cap_checkpoint_restore.c124 cap->data[1].effective |= 1 << (40 - 32); in set_capability()
/kernel/linux/linux-5.10/include/linux/
H A Dsecurity.h144 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
146 const kernel_cap_t *effective,
269 kernel_cap_t *effective,
273 const kernel_cap_t *effective,
536 kernel_cap_t *effective, in security_capget()
540 return cap_capget(target, effective, inheritable, permitted); in security_capget()
545 const kernel_cap_t *effective, in security_capset()
549 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
535 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) security_capget() argument
543 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) security_capset() argument

Completed in 23 milliseconds

12