Searched refs:effective (Results 1 - 4 of 4) sorted by relevance
/security/ |
H A D | commoncap.c | 54 " effective capabilities. Therefore not raising all" 66 * cap_capable - Determine whether a task has a particular effective capability 73 * its effective set, returning 0 if it does, -ve if it does not. 206 * @effective: The place to record the effective set 213 int cap_capget(struct task_struct *target, kernel_cap_t *effective, argument 221 *effective = cred->cap_effective; 248 * @effective: A pointer to the proposed new effective capabilities set 258 const kernel_cap_t *effective, 256 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument 345 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_cap) argument 446 get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_cap) argument 497 bool effective, has_cap = false; local [all...] |
H A D | security.c | 181 kernel_cap_t *effective, 185 return security_ops->capget(target, effective, inheritable, permitted); 189 const kernel_cap_t *effective, 194 effective, inheritable, permitted); 180 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 188 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|
/security/apparmor/ |
H A D | lsm.c | 116 static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, argument 126 *effective = cred->cap_effective; 131 *effective = cap_intersect(*effective, profile->caps.allow);
|
/security/selinux/ |
H A D | hooks.c | 2018 static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, argument 2027 return cap_capget(target, effective, inheritable, permitted); 2031 const kernel_cap_t *effective, 2038 effective, inheritable, permitted); 2030 selinux_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|
Completed in 33 milliseconds