/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | capability.c | 157 * and inheritable capabilities that are returned 186 kdata[i].inheritable = pI.cap[i]; 222 * and inheritable capabilities 239 kernel_cap_t inheritable, permitted, effective; local 265 inheritable.cap[i] = kdata[i].inheritable; 270 inheritable.cap[i] = 0; 279 &effective, &inheritable, &permitted);
|
H A D | auditsc.c | 91 kernel_cap_t inheritable; member in struct:audit_cap_data 1205 kernel_cap_t *inh = &name->fcap.inheritable; 1304 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); 1395 audit_log_cap(ab, "fi", &axs->fcap.inheritable); 1398 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); 1401 audit_log_cap(ab, "new_pi", &axs->new_pcap.inheritable); 1914 memset(&name->fcap.inheritable, 0, sizeof(kernel_cap_t)); 1926 name->fcap.inheritable = caps.inheritable; 2443 ax->fcap.inheritable [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/ |
H A D | commoncap.c | 150 * @inheritable: The place to record the inheritable set 157 kernel_cap_t *inheritable, kernel_cap_t *permitted) 165 *inheritable = cred->cap_inheritable; 172 * Determine whether the inheritable capabilities are limited to the old 192 * @inheritable: A pointer to the proposed new inheritable capabilities set 202 const kernel_cap_t *inheritable, 206 !cap_issubset(*inheritable, 209 /* incapable of using this inheritable se 156 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 199 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument 301 __u32 inheritable = caps->inheritable.cap[i]; local [all...] |
H A D | security.c | 150 kernel_cap_t *inheritable, 153 return security_ops->capget(target, effective, inheritable, permitted); 158 const kernel_cap_t *inheritable, 162 effective, inheritable, permitted); 148 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 156 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | capability.h | 48 __u32 inheritable; member in struct:__user_cap_data_struct 73 __le32 inheritable; /* Little endian */ member in struct:vfs_cap_data::__anon17246 102 kernel_cap_t inheritable; member in struct:cpu_vfs_cap_data 175 * to the current process' inheritable set
|
H A D | security.h | 59 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 62 const kernel_cap_t *inheritable, 223 * changes on the process such as clearing out non-inheritable signal 1230 * Get the @effective, @inheritable, and @permitted capability sets for 1236 * @inheritable contains the inheritable capability set. 1240 * Set the @effective, @inheritable, and @permitted capability sets for 1245 * @inheritable contains the inheritable capability set. 1370 kernel_cap_t *inheritable, kernel_cap_ 1833 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1841 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | oplock_linux.c | 34 uint32 inheritable; member in struct:cap_user_data
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/ |
H A D | lsm.c | 116 kernel_cap_t *inheritable, kernel_cap_t *permitted) 126 *inheritable = cred->cap_inheritable; 115 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ |
H A D | hooks.c | 1817 kernel_cap_t *inheritable, kernel_cap_t *permitted) 1825 return cap_capget(target, effective, inheritable, permitted); 1830 const kernel_cap_t *inheritable, 1836 effective, inheritable, permitted); 1816 selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1828 selinux_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
|