Home
last modified time | relevance | path

Searched refs:effective (Results 1 – 4 of 4) sorted by relevance

/kernel/bpf/
Dcgroup.c49 for (type = 0; type < ARRAY_SIZE(cgrp->bpf.effective); type++) { in cgroup_bpf_inherit()
52 e = rcu_dereference_protected(parent->bpf.effective[type], in cgroup_bpf_inherit()
54 rcu_assign_pointer(cgrp->bpf.effective[type], e); in cgroup_bpf_inherit()
90 struct bpf_prog *old_prog, *effective = NULL; in __cgroup_bpf_update() local
96 effective = rcu_dereference_protected(parent->bpf.effective[type], in __cgroup_bpf_update()
100 if (prog && effective && !overridable) in __cgroup_bpf_update()
106 if (prog && effective && overridable != new_overridable) in __cgroup_bpf_update()
116 effective = prog; in __cgroup_bpf_update()
139 rcu_assign_pointer(desc->bpf.effective[type], in __cgroup_bpf_update()
140 effective); in __cgroup_bpf_update()
[all …]
/kernel/
Dcapability.c172 kdata[i].effective = pE.cap[i]; in SYSCALL_DEFINE2()
227 kernel_cap_t inheritable, permitted, effective; in SYSCALL_DEFINE2() local
251 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2()
256 effective.cap[i] = 0; in SYSCALL_DEFINE2()
262 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
271 &effective, &inheritable, &permitted); in SYSCALL_DEFINE2()
Dauditsc.c1257 audit_log_cap(ab, "cap_pe", &context->capset.cap.effective); in show_special()
1373 audit_log_cap(ab, "old_pe", &axs->old_pcap.effective); in audit_log_exit()
1376 audit_log_cap(ab, "new_pe", &axs->new_pcap.effective); in audit_log_exit()
2329 ax->old_pcap.effective = old->cap_effective; in __audit_log_bprm_fcaps()
2333 ax->new_pcap.effective = new->cap_effective; in __audit_log_bprm_fcaps()
2349 context->capset.cap.effective = new->cap_effective; in __audit_log_capset()
Daudit.h69 kernel_cap_t effective; /* effective set of process */ member