/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/kernel/ |
H A D | capability.c | 40 * and inheritable capabilities that are returned 79 ret = security_capget(target, &data.effective, &data.inheritable, &data.permitted); 96 kernel_cap_t *inheritable, 109 inheritable, 112 inheritable, 130 kernel_cap_t *inheritable, 141 if (security_capset_check(target, effective, inheritable, 145 security_capset_set(target, effective, inheritable, permitted); 158 * and inheritable capabilities 175 kernel_cap_t inheritable, permitte local 95 cap_set_pg(int pgrp_nr, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 129 cap_set_all(kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/ |
H A D | commoncap.c | 68 kernel_cap_t *inheritable, kernel_cap_t *permitted) 72 *inheritable = cap_t (target->cap_inheritable); 78 kernel_cap_t *inheritable, kernel_cap_t *permitted) 82 if (!cap_issubset (*inheritable, 104 kernel_cap_t *inheritable, kernel_cap_t *permitted) 107 target->cap_inheritable = *inheritable; 124 * If only the real uid is 0, we only raise the inheritable 67 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 77 cap_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 103 cap_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
|
H A D | dummy.c | 38 kernel_cap_t * inheritable, kernel_cap_t * permitted) 40 *effective = *inheritable = *permitted = 0; 56 kernel_cap_t * inheritable, 64 kernel_cap_t * inheritable, 37 dummy_capget(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument 54 dummy_capset_check(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument 62 dummy_capset_set(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | security.h | 46 extern int cap_capget (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 47 extern int cap_capset_check (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 48 extern void cap_capset_set (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 1063 * Get the @effective, @inheritable, and @permitted capability sets for 1069 * @inheritable contains the inheritable capability set. 1073 * Check permission before setting the @effective, @inheritable, and 1081 * @inheritable contains the inheritable capability set. 1085 * Set the @effective, @inheritable, an 1410 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1418 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1426 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2155 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2163 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2171 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument [all...] |
H A D | capability.h | 37 __u32 inheritable; member in struct:__user_cap_data_struct
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | oplock_linux.c | 79 uint32 inheritable; member in struct:__anon1738
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/ |
H A D | hooks.c | 1388 kernel_cap_t *inheritable, kernel_cap_t *permitted) 1396 return secondary_ops->capget(target, effective, inheritable, permitted); 1400 kernel_cap_t *inheritable, kernel_cap_t *permitted) 1404 error = secondary_ops->capset_check(target, effective, inheritable, permitted); 1412 kernel_cap_t *inheritable, kernel_cap_t *permitted) 1414 secondary_ops->capset_set(target, effective, inheritable, permitted); 1387 selinux_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1399 selinux_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1411 selinux_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument
|