Searched defs:caps (Results 1 - 6 of 6) sorted by relevance

/security/apparmor/
H A DMakefile18 quiet_cmd_make-caps = GEN $@
19 cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\
67 $(call cmd,make-caps)
H A Dcapability.c37 kernel_cap_t caps; member in struct:audit_cache
80 !cap_raised(profile->caps.audit, cap)))
84 cap_raised(profile->caps.kill, cap)) {
86 } else if (cap_raised(profile->caps.quiet, cap) &&
95 if (profile == ent->profile && cap_raised(ent->caps, cap)) {
103 cap_raise(ent->caps, cap);
119 return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM;
/security/apparmor/include/
H A Dcapability.h26 * @audit: caps that are to be audited
27 * @quiet: caps that should not be audited
28 * @kill: caps that when requested will result in the task being killed
29 * @extended: caps that are subject finer grained mediation
43 static inline void aa_free_cap_rules(struct aa_caps *caps) argument
H A Dpolicy.h178 * @caps: capabilities for the profile
219 struct aa_caps caps; member in struct:aa_profile
/security/
H A Dcommoncap.c107 * user namespace has all caps.
345 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, argument
354 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
357 if (caps->magic_etc & VFS_CAP_REVISION_MASK)
361 __u32 permitted = caps->permitted.cap[i];
362 __u32 inheritable = caps->inheritable.cap[i];
393 struct vfs_cap_data caps; local
400 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps,
411 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps.magic_etc);
431 cpu_caps->permitted.cap[i] = le32_to_cpu(caps
[all...]
H A Dsecurity.c753 unsigned long caps = 0; local
756 caps = mapping->backing_dev_info->capabilities;
757 if (!(caps & BDI_CAP_EXEC_MAP))

Completed in 197 milliseconds