| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | capability.c | 173 kdata[i].inheritable = pI.cap[i]; in SYSCALL_DEFINE2() 226 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 252 inheritable.cap[i] = kdata[i].inheritable; in SYSCALL_DEFINE2() 257 inheritable.cap[i] = 0; in SYSCALL_DEFINE2() 263 inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 270 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
| H A D | auditsc.c | 1211 audit_log_cap(ab, "cap_fi", &name->fcap.inheritable); in audit_log_fcaps() 1349 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special() 1571 audit_log_cap(ab, "fi", &axs->fcap.inheritable); in audit_log_exit() 1574 audit_log_cap(ab, "old_pi", &axs->old_pcap.inheritable); in audit_log_exit() 1578 audit_log_cap(ab, "pi", &axs->new_pcap.inheritable); in audit_log_exit() 2004 name->fcap.inheritable = caps.inheritable; in audit_copy_fcaps() 2553 ax->fcap.inheritable = vcaps.inheritable; in __audit_log_bprm_fcaps() 2559 ax->old_pcap.inheritable = old->cap_inheritable; in __audit_log_bprm_fcaps() 2564 ax->new_pcap.inheritable = new->cap_inheritable; in __audit_log_bprm_fcaps() 2583 context->capset.cap.inheritable = new->cap_effective; in __audit_log_capset()
|
| H A D | audit.h | 53 kernel_cap_t inheritable; member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | capability.h | 47 __u32 inheritable; member 76 __le32 inheritable; /* Little endian */ member 87 __le32 inheritable; /* Little endian */ member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | capability.h | 47 __u32 inheritable; member 76 __le32 inheritable; /* Little endian */ member 87 __le32 inheritable; /* Little endian */ member
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | capability.h | 47 __u32 inheritable; member 76 __le32 inheritable; /* Little endian */ member 87 __le32 inheritable; /* Little endian */ member
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | commoncap.c | 200 kernel_cap_t *inheritable, kernel_cap_t *permitted) in cap_capget() argument 208 *inheritable = cred->cap_inheritable; in cap_capget() 244 const kernel_cap_t *inheritable, in cap_capset() argument 248 !cap_issubset(*inheritable, in cap_capset() 254 if (!cap_issubset(*inheritable, in cap_capset() 269 new->cap_inheritable = *inheritable; in cap_capset() 278 *inheritable)); in cap_capset() 567 __u32 inheritable = caps->inheritable.cap[i]; in bprm_caps_from_vfs_caps() local 575 (new->cap_inheritable.cap[i] & inheritable); in bprm_caps_from_vfs_caps() 657 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable); in get_vfs_caps_from_disk() [all …]
|
| H A D | security.c | 727 kernel_cap_t *inheritable, in security_capget() argument 731 effective, inheritable, permitted); in security_capget() 736 const kernel_cap_t *inheritable, in security_capset() argument 740 effective, inheritable, permitted); in security_capset()
|
| /OK3568_Linux_fs/kernel/fs/btrfs/ |
| H A D | props.c | 23 int inheritable; member 319 .inheritable = 1 342 if (!h->inheritable) in inherit_props()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | security.h | 142 …get(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *… 145 const kernel_cap_t *inheritable, 268 kernel_cap_t *inheritable, 272 const kernel_cap_t *inheritable, 536 kernel_cap_t *inheritable, in security_capget() argument 539 return cap_capget(target, effective, inheritable, permitted); in security_capget() 545 const kernel_cap_t *inheritable, in security_capset() argument 548 return cap_capset(new, old, effective, inheritable, permitted); in security_capset()
|
| H A D | capability.h | 32 kernel_cap_t inheritable; member
|
| H A D | lsm_hook_defs.h | 40 kernel_cap_t *inheritable, kernel_cap_t *permitted) 42 const kernel_cap_t *effective, const kernel_cap_t *inheritable,
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | credentials.rst | 149 - Set of inheritable capabilities 161 inheritable set might also be so constrained. 166 The inheritable capabilities are the ones that may get passed across
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/mm/ |
| H A D | numa_memory_policy.rst | 55 it is inheritable, and indeed is inherited, across both fork() 108 are NOT inheritable across exec(). Thus, only NUMA-aware
|
| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | lsm.c | 148 kernel_cap_t *inheritable, kernel_cap_t *permitted) in apparmor_capget() argument
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | hooks.c | 2115 kernel_cap_t *inheritable, kernel_cap_t *permitted) in selinux_capget() argument 2124 const kernel_cap_t *inheritable, in selinux_capset() argument
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | vfs.rst | 1283 and the parent VFS mount record to provide inheritable mount
|
| H A D | proc.rst | 287 CapInh bitmap of inheritable capabilities
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |