Searched refs:inheritable (Results 1 - 9 of 9) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/
H A Dcapability.c157 * and inheritable capabilities that are returned
186 kdata[i].inheritable = pI.cap[i];
222 * and inheritable capabilities
239 kernel_cap_t inheritable, permitted, effective; local
265 inheritable.cap[i] = kdata[i].inheritable;
270 inheritable.cap[i] = 0;
279 &effective, &inheritable, &permitted);
H A Dauditsc.c91 kernel_cap_t inheritable; member in struct:audit_cap_data
1205 kernel_cap_t *inh = &name->fcap.inheritable;
1304 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable);
1395 audit_log_cap(ab, "fi", &axs->fcap.inheritable);
1398 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable);
1401 audit_log_cap(ab, "new_pi", &axs->new_pcap.inheritable);
1914 memset(&name->fcap.inheritable, 0, sizeof(kernel_cap_t));
1926 name->fcap.inheritable = caps.inheritable;
2443 ax->fcap.inheritable
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/
H A Dcommoncap.c150 * @inheritable: The place to record the inheritable set
157 kernel_cap_t *inheritable, kernel_cap_t *permitted)
165 *inheritable = cred->cap_inheritable;
172 * Determine whether the inheritable capabilities are limited to the old
192 * @inheritable: A pointer to the proposed new inheritable capabilities set
202 const kernel_cap_t *inheritable,
206 !cap_issubset(*inheritable,
209 /* incapable of using this inheritable se
156 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
199 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
301 __u32 inheritable = caps->inheritable.cap[i]; local
[all...]
H A Dsecurity.c150 kernel_cap_t *inheritable,
153 return security_ops->capget(target, effective, inheritable, permitted);
158 const kernel_cap_t *inheritable,
162 effective, inheritable, permitted);
148 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
156 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dcapability.h48 __u32 inheritable; member in struct:__user_cap_data_struct
73 __le32 inheritable; /* Little endian */ member in struct:vfs_cap_data::__anon17246
102 kernel_cap_t inheritable; member in struct:cpu_vfs_cap_data
175 * to the current process' inheritable set
H A Dsecurity.h59 extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
62 const kernel_cap_t *inheritable,
223 * changes on the process such as clearing out non-inheritable signal
1230 * Get the @effective, @inheritable, and @permitted capability sets for
1236 * @inheritable contains the inheritable capability set.
1240 * Set the @effective, @inheritable, and @permitted capability sets for
1245 * @inheritable contains the inheritable capability set.
1370 kernel_cap_t *inheritable, kernel_cap_
1833 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1841 security_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Doplock_linux.c34 uint32 inheritable; member in struct:cap_user_data
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/
H A Dlsm.c116 kernel_cap_t *inheritable, kernel_cap_t *permitted)
126 *inheritable = cred->cap_inheritable;
115 apparmor_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/
H A Dhooks.c1817 kernel_cap_t *inheritable, kernel_cap_t *permitted)
1825 return cap_capget(target, effective, inheritable, permitted);
1830 const kernel_cap_t *inheritable,
1836 effective, inheritable, permitted);
1816 selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
1828 selinux_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument

Completed in 89 milliseconds