Searched defs:caps (Results 1 - 6 of 6) sorted by relevance
/security/apparmor/ |
H A D | Makefile | 18 quiet_cmd_make-caps = GEN $@ 19 cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\ 67 $(call cmd,make-caps)
|
H A D | capability.c | 37 kernel_cap_t caps; member in struct:audit_cache 80 !cap_raised(profile->caps.audit, cap))) 84 cap_raised(profile->caps.kill, cap)) { 86 } else if (cap_raised(profile->caps.quiet, cap) && 95 if (profile == ent->profile && cap_raised(ent->caps, cap)) { 103 cap_raise(ent->caps, cap); 119 return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM;
|
/security/apparmor/include/ |
H A D | capability.h | 26 * @audit: caps that are to be audited 27 * @quiet: caps that should not be audited 28 * @kill: caps that when requested will result in the task being killed 29 * @extended: caps that are subject finer grained mediation 43 static inline void aa_free_cap_rules(struct aa_caps *caps) argument
|
H A D | policy.h | 178 * @caps: capabilities for the profile 219 struct aa_caps caps; member in struct:aa_profile
|
/security/ |
H A D | commoncap.c | 107 * user namespace has all caps. 345 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, argument 354 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE) 357 if (caps->magic_etc & VFS_CAP_REVISION_MASK) 361 __u32 permitted = caps->permitted.cap[i]; 362 __u32 inheritable = caps->inheritable.cap[i]; 393 struct vfs_cap_data caps; local 400 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, 411 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps.magic_etc); 431 cpu_caps->permitted.cap[i] = le32_to_cpu(caps [all...] |
H A D | security.c | 753 unsigned long caps = 0; local 756 caps = mapping->backing_dev_info->capabilities; 757 if (!(caps & BDI_CAP_EXEC_MAP))
|
Completed in 540 milliseconds