Symbol: kernel_cap_t
fs/proc/array.c
303
kernel_cap_t *a)
fs/proc/array.c
313
kernel_cap_t cap_inheritable, cap_permitted, cap_effective,
include/linux/capability.h
100
static inline bool cap_isidentical(const kernel_cap_t a, const kernel_cap_t b)
include/linux/capability.h
112
static inline bool cap_issubset(const kernel_cap_t a, const kernel_cap_t set)
include/linux/capability.h
119
static inline kernel_cap_t cap_drop_fs_set(const kernel_cap_t a)
include/linux/capability.h
124
static inline kernel_cap_t cap_raise_fs_set(const kernel_cap_t a,
include/linux/capability.h
125
const kernel_cap_t permitted)
include/linux/capability.h
130
static inline kernel_cap_t cap_drop_nfsd_set(const kernel_cap_t a)
include/linux/capability.h
135
static inline kernel_cap_t cap_raise_nfsd_set(const kernel_cap_t a,
include/linux/capability.h
136
const kernel_cap_t permitted)
include/linux/capability.h
30
kernel_cap_t permitted;
include/linux/capability.h
31
kernel_cap_t inheritable;
include/linux/capability.h
35
#define _KERNEL_CAP_T_SIZE (sizeof(kernel_cap_t))
include/linux/capability.h
66
# define CAP_EMPTY_SET ((kernel_cap_t) { 0 })
include/linux/capability.h
67
# define CAP_FULL_SET ((kernel_cap_t) { CAP_VALID_MASK })
include/linux/capability.h
68
# define CAP_FS_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_LINUX_IMMUTABLE) })
include/linux/capability.h
69
# define CAP_NFSD_SET ((kernel_cap_t) { CAP_FS_MASK | BIT_ULL(CAP_SYS_RESOURCE) })
include/linux/capability.h
77
static inline kernel_cap_t cap_combine(const kernel_cap_t a,
include/linux/capability.h
78
const kernel_cap_t b)
include/linux/capability.h
80
return (kernel_cap_t) { a.val | b.val };
include/linux/capability.h
83
static inline kernel_cap_t cap_intersect(const kernel_cap_t a,
include/linux/capability.h
84
const kernel_cap_t b)
include/linux/capability.h
86
return (kernel_cap_t) { a.val & b.val };
include/linux/capability.h
89
static inline kernel_cap_t cap_drop(const kernel_cap_t a,
include/linux/capability.h
90
const kernel_cap_t drop)
include/linux/capability.h
92
return (kernel_cap_t) { a.val &~ drop.val };
include/linux/capability.h
95
static inline bool cap_isclear(const kernel_cap_t a)
include/linux/cred.h
124
kernel_cap_t cap_inheritable; /* caps our children can inherit */
include/linux/cred.h
125
kernel_cap_t cap_permitted; /* caps we're permitted */
include/linux/cred.h
126
kernel_cap_t cap_effective; /* caps we can actually use */
include/linux/cred.h
127
kernel_cap_t cap_bset; /* capability bounding set */
include/linux/cred.h
128
kernel_cap_t cap_ambient; /* Ambient capability set */
include/linux/lsm_hook_defs.h
39
LSM_HOOK(int, 0, capget, const struct task_struct *target, kernel_cap_t *effective,
include/linux/lsm_hook_defs.h
40
kernel_cap_t *inheritable, kernel_cap_t *permitted)
include/linux/lsm_hook_defs.h
42
const kernel_cap_t *effective, const kernel_cap_t *inheritable,
include/linux/lsm_hook_defs.h
43
const kernel_cap_t *permitted)
include/linux/security.h
179
extern int cap_capget(const struct task_struct *target, kernel_cap_t *effective,
include/linux/security.h
180
kernel_cap_t *inheritable, kernel_cap_t *permitted);
include/linux/security.h
182
const kernel_cap_t *effective,
include/linux/security.h
183
const kernel_cap_t *inheritable,
include/linux/security.h
184
const kernel_cap_t *permitted);
include/linux/security.h
342
kernel_cap_t *effective,
include/linux/security.h
343
kernel_cap_t *inheritable,
include/linux/security.h
344
kernel_cap_t *permitted);
include/linux/security.h
346
const kernel_cap_t *effective,
include/linux/security.h
347
const kernel_cap_t *inheritable,
include/linux/security.h
348
const kernel_cap_t *permitted);
include/linux/security.h
674
kernel_cap_t *effective,
include/linux/security.h
675
kernel_cap_t *inheritable,
include/linux/security.h
676
kernel_cap_t *permitted)
include/linux/security.h
683
const kernel_cap_t *effective,
include/linux/security.h
684
const kernel_cap_t *inheritable,
include/linux/security.h
685
const kernel_cap_t *permitted)
kernel/audit.h
57
kernel_cap_t permitted;
kernel/audit.h
58
kernel_cap_t inheritable;
kernel/audit.h
61
kernel_cap_t effective; /* effective set of process */
kernel/audit.h
63
kernel_cap_t ambient;
kernel/auditsc.c
1295
kernel_cap_t *cap)
kernel/capability.c
105
static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp,
kernel/capability.c
106
kernel_cap_t *pIp, kernel_cap_t *pPp)
kernel/capability.c
142
kernel_cap_t pE, pI, pP;
kernel/capability.c
193
static kernel_cap_t mk_kernel_cap(u32 low, u32 high)
kernel/capability.c
195
return (kernel_cap_t) { (low | ((u64)high << 32)) & CAP_VALID_MASK };
kernel/capability.c
220
kernel_cap_t inheritable, permitted, effective;
kernel/umh.c
34
static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
kernel/umh.c
35
static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
kernel/umh.c
502
kernel_cap_t new_cap, *cap;
security/apparmor/capability.c
194
kernel_cap_t aa_profile_capget(struct aa_profile *profile)
security/apparmor/capability.c
201
kernel_cap_t caps = CAP_EMPTY_SET;
security/apparmor/include/capability.h
29
kernel_cap_t allow;
security/apparmor/include/capability.h
30
kernel_cap_t audit;
security/apparmor/include/capability.h
31
kernel_cap_t denied;
security/apparmor/include/capability.h
32
kernel_cap_t quiet;
security/apparmor/include/capability.h
33
kernel_cap_t kill;
security/apparmor/include/capability.h
34
kernel_cap_t extended;
security/apparmor/include/capability.h
39
kernel_cap_t aa_profile_capget(struct aa_profile *profile);
security/apparmor/lsm.c
164
static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective,
security/apparmor/lsm.c
165
kernel_cap_t *inheritable, kernel_cap_t *permitted)
security/apparmor/lsm.c
183
kernel_cap_t allowed;
security/apparmor/policy_unpack.c
1124
kernel_cap_t tmpcap;
security/apparmor/policy_unpack.c
328
static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name)
security/apparmor/policy_unpack.c
338
static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name)
security/commoncap.c
168
const kernel_cap_t *caller_caps;
security/commoncap.c
230
int cap_capget(const struct task_struct *target, kernel_cap_t *effective,
security/commoncap.c
231
kernel_cap_t *inheritable, kernel_cap_t *permitted)
security/commoncap.c
274
const kernel_cap_t *effective,
security/commoncap.c
275
const kernel_cap_t *inheritable,
security/commoncap.c
276
const kernel_cap_t *permitted)
security/security.c
588
kernel_cap_t *effective,
security/security.c
589
kernel_cap_t *inheritable,
security/security.c
590
kernel_cap_t *permitted)
security/security.c
609
const kernel_cap_t *effective,
security/security.c
610
const kernel_cap_t *inheritable,
security/security.c
611
const kernel_cap_t *permitted)
security/selinux/hooks.c
2136
static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective,
security/selinux/hooks.c
2137
kernel_cap_t *inheritable, kernel_cap_t *permitted)
security/selinux/hooks.c
2144
const kernel_cap_t *effective,
security/selinux/hooks.c
2145
const kernel_cap_t *inheritable,
security/selinux/hooks.c
2146
const kernel_cap_t *permitted)
tools/testing/selftests/bpf/progs/test_deny_namespace.c
11
kernel_cap_t cap_effective;
tools/testing/selftests/bpf/progs/test_deny_namespace.c
19
kernel_cap_t caps = cred->cap_effective;