Searched refs:caps (Results 1 – 9 of 9) sorted by relevance
/security/apparmor/ |
D | capability.c | 32 kernel_cap_t caps; member 78 !cap_raised(profile->caps.audit, cap))) in audit_caps() 82 cap_raised(profile->caps.kill, cap)) { in audit_caps() 84 } else if (cap_raised(profile->caps.quiet, cap) && in audit_caps() 93 if (profile == ent->profile && cap_raised(ent->caps, cap)) { in audit_caps() 101 cap_raise(ent->caps, cap); in audit_caps() 117 return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM; in profile_capable()
|
D | Makefile | 17 quiet_cmd_make-caps = GEN $@ 18 cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\ 62 $(call cmd,make-caps)
|
D | policy_unpack.c | 531 if (!unpack_u32(e, &(profile->caps.allow.cap[0]), NULL)) in unpack_profile() 533 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile() 535 if (!unpack_u32(e, &(profile->caps.quiet.cap[0]), NULL)) in unpack_profile() 542 if (!unpack_u32(e, &(profile->caps.allow.cap[1]), NULL)) in unpack_profile() 544 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile() 546 if (!unpack_u32(e, &(profile->caps.quiet.cap[1]), NULL)) in unpack_profile() 556 if (!unpack_u32(e, &(profile->caps.extended.cap[0]), NULL)) in unpack_profile() 558 if (!unpack_u32(e, &(profile->caps.extended.cap[1]), NULL)) in unpack_profile()
|
D | lsm.c | 131 *effective = cap_intersect(*effective, profile->caps.allow); in apparmor_capget() 132 *permitted = cap_intersect(*permitted, profile->caps.allow); in apparmor_capget()
|
D | policy.c | 749 aa_free_cap_rules(&profile->caps); in free_profile()
|
/security/ |
D | commoncap.c | 355 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, in bprm_caps_from_vfs_caps() argument 364 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE) in bprm_caps_from_vfs_caps() 367 if (caps->magic_etc & VFS_CAP_REVISION_MASK) in bprm_caps_from_vfs_caps() 371 __u32 permitted = caps->permitted.cap[i]; in bprm_caps_from_vfs_caps() 372 __u32 inheritable = caps->inheritable.cap[i]; in bprm_caps_from_vfs_caps() 404 struct vfs_cap_data caps; in get_vfs_caps_from_disk() local 411 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, in get_vfs_caps_from_disk() 422 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps.magic_etc); in get_vfs_caps_from_disk() 442 cpu_caps->permitted.cap[i] = le32_to_cpu(caps.data[i].permitted); in get_vfs_caps_from_disk() 443 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps.data[i].inheritable); in get_vfs_caps_from_disk()
|
D | security.c | 723 unsigned long caps = 0; in mmap_prot() local 726 caps = mapping->backing_dev_info->capabilities; in mmap_prot() 727 if (!(caps & BDI_CAP_EXEC_MAP)) in mmap_prot()
|
/security/apparmor/include/ |
D | capability.h | 40 static inline void aa_free_cap_rules(struct aa_caps *caps) in aa_free_cap_rules() argument
|
D | policy.h | 196 struct aa_caps caps; member
|