/linux-6.1.9/kernel/ |
D | capability.c | 173 kdata[i].inheritable = pI.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 252 inheritable.cap[i] = kdata[i].inheritable; in SYSCALL_DEFINE2() 257 inheritable.cap[i] = 0; in SYSCALL_DEFINE2() 263 inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1312 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps() 1453 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special() 1730 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit() 1733 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit() 1737 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit() 2257 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps() 2811 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps() 2817 ax->old_pcap.inheritable = old->cap_inheritable; in __audit_log_bprm_fcaps() 2822 ax->new_pcap.inheritable = new->cap_inheritable; in __audit_log_bprm_fcaps() 2842 context->capset.cap.inheritable = new->cap_effective; in __audit_log_capset()
|
D | audit.h | 57 kernel_cap_t inheritable; member
|
/linux-6.1.9/include/uapi/linux/ |
D | capability.h | 47 __u32 inheritable; member 76 __le32 inheritable; /* Little endian */ member 87 __le32 inheritable; /* Little endian */ member
|
/linux-6.1.9/security/ |
D | commoncap.c | 201 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 209 *inheritable = cred->cap_inheritable; in cap_capget() 245 const kernel_cap_t *inheritable, in cap_capset() argument 249 !cap_issubset(*inheritable, in cap_capset() 255 if (!cap_issubset(*inheritable, in cap_capset() 270 new->cap_inheritable = *inheritable; in cap_capset() 279 *inheritable)); in cap_capset() 611 __u32 inheritable = caps->inheritable.cap[i]; in bprm_caps_from_vfs_caps() local 619 (new->cap_inheritable.cap[i] & inheritable); in bprm_caps_from_vfs_caps() 715 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable); in get_vfs_caps_from_disk() [all …]
|
D | security.c | 788 kernel_cap_t *inheritable, in security_capget() argument 792 effective, inheritable, permitted); in security_capget() 797 const kernel_cap_t *inheritable, in security_capset() argument 801 effective, inheritable, permitted); in security_capset()
|
/linux-6.1.9/fs/btrfs/ |
D | props.c | 25 int inheritable; member 376 .inheritable = 1 398 if (!h->inheritable) in btrfs_inode_inherit_props()
|
/linux-6.1.9/include/linux/ |
D | security.h | 147 …get(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *… 150 const kernel_cap_t *inheritable, 276 kernel_cap_t *inheritable, 280 const kernel_cap_t *inheritable, 554 kernel_cap_t *inheritable, in security_capget() argument 557 return cap_capget(target, effective, inheritable, permitted); in security_capget() 563 const kernel_cap_t *inheritable, in security_capset() argument 566 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
D | capability.h | 32 kernel_cap_t inheritable; member
|
D | lsm_hook_defs.h | 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
|
/linux-6.1.9/Documentation/security/ |
D | credentials.rst | 149 - Set of inheritable capabilities 161 inheritable set might also be so constrained. 166 The inheritable capabilities are the ones that may get passed across
|
/linux-6.1.9/Documentation/admin-guide/mm/ |
D | numa_memory_policy.rst | 55 it is inheritable, and indeed is inherited, across both fork() 108 are NOT inheritable across exec(). Thus, only NUMA-aware
|
/linux-6.1.9/security/apparmor/ |
D | lsm.c | 148 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
|
/linux-6.1.9/security/selinux/ |
D | hooks.c | 2091 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() argument 2100 const kernel_cap_t *inheritable, in selinux_capset() argument
|
/linux-6.1.9/Documentation/filesystems/ |
D | vfs.rst | 1316 and the parent VFS mount record to provide inheritable mount
|
D | proc.rst | 288 CapInh bitmap of inheritable capabilities
|