Searched refs:effective (Results 1 – 4 of 4) sorted by relevance
/kernel/bpf/ |
D | cgroup.c | 49 for (type = 0; type < ARRAY_SIZE(cgrp->bpf.effective); type++) { in cgroup_bpf_inherit() 52 e = rcu_dereference_protected(parent->bpf.effective[type], in cgroup_bpf_inherit() 54 rcu_assign_pointer(cgrp->bpf.effective[type], e); in cgroup_bpf_inherit() 90 struct bpf_prog *old_prog, *effective = NULL; in __cgroup_bpf_update() local 96 effective = rcu_dereference_protected(parent->bpf.effective[type], in __cgroup_bpf_update() 100 if (prog && effective && !overridable) in __cgroup_bpf_update() 106 if (prog && effective && overridable != new_overridable) in __cgroup_bpf_update() 116 effective = prog; in __cgroup_bpf_update() 139 rcu_assign_pointer(desc->bpf.effective[type], in __cgroup_bpf_update() 140 effective); in __cgroup_bpf_update() [all …]
|
/kernel/ |
D | capability.c | 172 kdata[i].effective = pE.cap[i]; in SYSCALL_DEFINE2() 227 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local 251 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2() 256 effective.cap[i] = 0; in SYSCALL_DEFINE2() 262 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2() 271 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
|
D | auditsc.c | 1257 audit_log_cap(ab, "cap_pe", &context->capset.cap.effective); in show_special() 1373 audit_log_cap(ab, "old_pe", &axs->old_pcap.effective); in audit_log_exit() 1376 audit_log_cap(ab, "new_pe", &axs->new_pcap.effective); in audit_log_exit() 2329 ax->old_pcap.effective = old->cap_effective; in __audit_log_bprm_fcaps() 2333 ax->new_pcap.effective = new->cap_effective; in __audit_log_bprm_fcaps() 2349 context->capset.cap.effective = new->cap_effective; in __audit_log_capset()
|
D | audit.h | 69 kernel_cap_t effective; /* effective set of process */ member
|