Home
last modified time | relevance | path

Searched refs:caps (Results 1 – 9 of 9) sorted by relevance

/security/apparmor/
Dcapability.c32 kernel_cap_t caps; member
78 !cap_raised(profile->caps.audit, cap))) in audit_caps()
82 cap_raised(profile->caps.kill, cap)) { in audit_caps()
84 } else if (cap_raised(profile->caps.quiet, cap) && in audit_caps()
93 if (profile == ent->profile && cap_raised(ent->caps, cap)) { in audit_caps()
101 cap_raise(ent->caps, cap); in audit_caps()
117 return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM; in profile_capable()
DMakefile17 quiet_cmd_make-caps = GEN $@
18 cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\
62 $(call cmd,make-caps)
Dpolicy_unpack.c531 if (!unpack_u32(e, &(profile->caps.allow.cap[0]), NULL)) in unpack_profile()
533 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile()
535 if (!unpack_u32(e, &(profile->caps.quiet.cap[0]), NULL)) in unpack_profile()
542 if (!unpack_u32(e, &(profile->caps.allow.cap[1]), NULL)) in unpack_profile()
544 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile()
546 if (!unpack_u32(e, &(profile->caps.quiet.cap[1]), NULL)) in unpack_profile()
556 if (!unpack_u32(e, &(profile->caps.extended.cap[0]), NULL)) in unpack_profile()
558 if (!unpack_u32(e, &(profile->caps.extended.cap[1]), NULL)) in unpack_profile()
Dlsm.c131 *effective = cap_intersect(*effective, profile->caps.allow); in apparmor_capget()
132 *permitted = cap_intersect(*permitted, profile->caps.allow); in apparmor_capget()
Dpolicy.c749 aa_free_cap_rules(&profile->caps); in free_profile()
/security/
Dcommoncap.c355 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, in bprm_caps_from_vfs_caps() argument
364 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE) in bprm_caps_from_vfs_caps()
367 if (caps->magic_etc & VFS_CAP_REVISION_MASK) in bprm_caps_from_vfs_caps()
371 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps()
372 __u32 inheritable = caps->inheritable.cap[i]; in bprm_caps_from_vfs_caps()
404 struct vfs_cap_data caps; in get_vfs_caps_from_disk() local
411 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, in get_vfs_caps_from_disk()
422 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps.magic_etc); in get_vfs_caps_from_disk()
442 cpu_caps->permitted.cap[i] = le32_to_cpu(caps.data[i].permitted); in get_vfs_caps_from_disk()
443 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps.data[i].inheritable); in get_vfs_caps_from_disk()
Dsecurity.c723 unsigned long caps = 0; in mmap_prot() local
726 caps = mapping->backing_dev_info->capabilities; in mmap_prot()
727 if (!(caps & BDI_CAP_EXEC_MAP)) in mmap_prot()
/security/apparmor/include/
Dcapability.h40 static inline void aa_free_cap_rules(struct aa_caps *caps) in aa_free_cap_rules() argument
Dpolicy.h196 struct aa_caps caps; member