Current Path: > > usr > include > sys
Operation : Linux premium107.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64 Software : Apache Server IP : 198.54.126.246 | Your IP: 216.73.216.181 Domains : 1034 Domain(s) Permission : [ 0755 ]
| Name | Type | Size | Last Modified | Actions |
|---|---|---|---|---|
| acct.h | File | 3296 bytes | December 08 2025 09:36:36. | |
| auxv.h | File | 1259 bytes | December 08 2025 09:36:36. | |
| bitypes.h | File | 86 bytes | December 08 2025 09:36:49. | |
| capability.h | File | 7233 bytes | January 10 2024 14:34:46. | |
| cdefs.h | File | 20682 bytes | December 08 2025 09:36:36. | |
| debugreg.h | File | 3575 bytes | December 08 2025 09:36:36. | |
| dir.h | File | 921 bytes | December 08 2025 09:36:36. | |
| elf.h | File | 1023 bytes | December 08 2025 09:36:36. | |
| epoll.h | File | 4410 bytes | December 08 2025 09:36:36. | |
| errno.h | File | 19 bytes | December 08 2025 09:36:34. | |
| eventfd.h | File | 1399 bytes | December 08 2025 09:36:36. | |
| fanotify.h | File | 1291 bytes | December 08 2025 09:36:36. | |
| fcntl.h | File | 19 bytes | December 08 2025 09:36:36. | |
| file.h | File | 1674 bytes | December 08 2025 09:36:36. | |
| fsuid.h | File | 1187 bytes | December 08 2025 09:36:36. | |
| gmon.h | File | 6230 bytes | December 08 2025 09:36:36. | |
| gmon_out.h | File | 2635 bytes | December 08 2025 09:36:36. | |
| inotify.h | File | 3837 bytes | December 08 2025 09:36:36. | |
| io.h | File | 5085 bytes | December 08 2025 09:36:36. | |
| ioctl.h | File | 1739 bytes | December 08 2025 09:36:36. | |
| ipc.h | File | 1461 bytes | December 08 2025 09:36:36. | |
| kd.h | File | 1111 bytes | December 08 2025 09:36:36. | |
| klog.h | File | 1203 bytes | December 08 2025 09:36:36. | |
| mman.h | File | 5551 bytes | December 08 2025 09:36:36. | |
| mount.h | File | 5611 bytes | December 08 2025 09:36:36. | |
| msg.h | File | 2365 bytes | December 08 2025 09:36:36. | |
| mtio.h | File | 11162 bytes | December 08 2025 09:36:36. | |
| param.h | File | 3148 bytes | December 08 2025 09:36:36. | |
| pci.h | File | 922 bytes | December 08 2025 09:36:36. | |
| perm.h | File | 1126 bytes | December 08 2025 09:36:36. | |
| personality.h | File | 2722 bytes | December 08 2025 09:36:36. | |
| poll.h | File | 2549 bytes | December 08 2025 09:36:36. | |
| prctl.h | File | 1058 bytes | December 08 2025 09:36:36. | |
| procfs.h | File | 4985 bytes | December 08 2025 09:36:48. | |
| profil.h | File | 1958 bytes | December 08 2025 09:36:36. | |
| psx_syscall.h | File | 2833 bytes | January 10 2024 14:34:46. | |
| ptrace.h | File | 5988 bytes | December 08 2025 09:36:36. | |
| queue.h | File | 19539 bytes | December 08 2025 09:36:36. | |
| quota.h | File | 5172 bytes | December 08 2025 09:36:36. | |
| random.h | File | 1443 bytes | December 08 2025 09:36:34. | |
| raw.h | File | 1181 bytes | December 08 2025 09:36:36. | |
| reboot.h | File | 1632 bytes | December 08 2025 09:36:36. | |
| reg.h | File | 1826 bytes | December 08 2025 09:36:36. | |
| resource.h | File | 3645 bytes | December 08 2025 09:36:36. | |
| sdt-config.h | File | 276 bytes | October 14 2023 13:06:47. | |
| sdt.h | File | 22157 bytes | October 14 2023 13:06:47. | |
| select.h | File | 4140 bytes | December 08 2025 09:36:36. | |
| sem.h | File | 2036 bytes | December 08 2025 09:36:36. | |
| sendfile.h | File | 1805 bytes | December 08 2025 09:36:36. | |
| shm.h | File | 1873 bytes | December 08 2025 09:36:36. | |
| signal.h | File | 20 bytes | December 08 2025 09:36:34. | |
| signalfd.h | File | 1599 bytes | December 08 2025 09:36:36. | |
| socket.h | File | 10203 bytes | December 08 2025 09:36:36. | |
| socketvar.h | File | 141 bytes | December 08 2025 09:36:36. | |
| soundcard.h | File | 29 bytes | December 08 2025 09:36:36. | |
| stat.h | File | 16236 bytes | December 08 2025 09:36:36. | |
| statfs.h | File | 2093 bytes | December 08 2025 09:36:36. | |
| statvfs.h | File | 2819 bytes | December 08 2025 09:36:36. | |
| swap.h | File | 1592 bytes | December 08 2025 09:36:36. | |
| syscall.h | File | 1335 bytes | December 08 2025 09:36:36. | |
| sysctl.h | File | 2004 bytes | December 08 2025 09:36:36. | |
| sysinfo.h | File | 1517 bytes | December 08 2025 09:36:36. | |
| syslog.h | File | 7702 bytes | December 08 2025 09:36:36. | |
| sysmacros.h | File | 2102 bytes | December 08 2025 09:36:36. | |
| termios.h | File | 74 bytes | December 08 2025 09:36:36. | |
| time.h | File | 6656 bytes | December 08 2025 09:36:35. | |
| timeb.h | File | 1376 bytes | December 08 2025 09:36:35. | |
| timerfd.h | File | 1873 bytes | December 08 2025 09:36:36. | |
| times.h | File | 1596 bytes | December 08 2025 09:36:36. | |
| timex.h | File | 2205 bytes | December 08 2025 09:36:35. | |
| ttychars.h | File | 2499 bytes | December 08 2025 09:36:36. | |
| ttydefaults.h | File | 3568 bytes | December 08 2025 09:36:36. | |
| types.h | File | 5712 bytes | December 08 2025 09:36:36. | |
| ucontext.h | File | 5841 bytes | December 08 2025 09:36:34. | |
| uio.h | File | 6279 bytes | December 08 2025 09:36:36. | |
| un.h | File | 1452 bytes | December 08 2025 09:36:36. | |
| unistd.h | File | 20 bytes | December 08 2025 09:36:36. | |
| user.h | File | 5207 bytes | December 08 2025 09:36:36. | |
| utsname.h | File | 2480 bytes | December 08 2025 09:36:36. | |
| vfs.h | File | 161 bytes | December 08 2025 09:36:36. | |
| vlimit.h | File | 1879 bytes | December 08 2025 09:36:36. | |
| vm86.h | File | 1198 bytes | December 08 2025 09:36:36. | |
| vt.h | File | 22 bytes | December 08 2025 09:36:36. | |
| vtimes.h | File | 2462 bytes | December 08 2025 09:36:36. | |
| wait.h | File | 5604 bytes | December 08 2025 09:36:36. | |
| xattr.h | File | 4274 bytes | December 08 2025 09:36:36. |
/*
* <sys/capability.h>
*
* Copyright (C) 1997 Aleph One
* Copyright (C) 1997,8, 2008,19,20 Andrew G. Morgan <morgan@kernel.org>
*
* defunct POSIX.1e Standard: 25.2 Capabilities <sys/capability.h>
*/
#ifndef _SYS_CAPABILITY_H
#define _SYS_CAPABILITY_H
#ifdef __cplusplus
extern "C" {
#endif
/*
* This file complements the kernel file by providing prototype
* information for the user library.
*/
#include <sys/types.h>
#include <stdint.h>
#include <linux/types.h>
#ifndef __user
#define __user
#endif
#include <linux/capability.h>
/*
* POSIX capability types
*/
/*
* Opaque capability handle (defined internally by libcap)
* internal capability representation
*/
typedef struct _cap_struct *cap_t;
/* "external" capability representation is a (void *) */
/*
* This is the type used to identify capabilities
*/
typedef int cap_value_t;
/*
* libcap initialized first unnamed capability of the running kernel.
* capsh includes a runtime test to flag when this is larger than
* what is known to libcap... Time for a new libcap release!
*/
extern cap_value_t cap_max_bits(void);
/*
* Set identifiers
*/
typedef enum {
CAP_EFFECTIVE = 0, /* Specifies the effective flag */
CAP_PERMITTED = 1, /* Specifies the permitted flag */
CAP_INHERITABLE = 2 /* Specifies the inheritable flag */
} cap_flag_t;
typedef enum {
CAP_IAB_INH = 2,
CAP_IAB_AMB = 3,
CAP_IAB_BOUND = 4
} cap_iab_vector_t;
/*
* An opaque generalization of the inheritable bits that includes both
* what ambient bits to raise and what bounding bits to *lower* (aka
* drop). None of these bits once set, using cap_iab_set(), affect
* the running process but are consulted, through the execve() system
* call, by the kernel. Note, the ambient bits ('A') of the running
* process are fragile with respect to other aspects of the "posix"
* (cap_t) operations: most importantly, 'A' cannot ever hold bits not
* present in the intersection of 'pI' and 'pP'. The kernel
* immediately drops all ambient caps whenever such a situation
* arises. Typically, the ambient bits are used to support a naive
* capability inheritance model - at odds with the POSIX (sic) model
* of inheritance where inherited (pI) capabilities need to also be
* wanted by the executed binary (fI) in order to become raised
* through exec.
*/
typedef struct cap_iab_s *cap_iab_t;
/*
* These are the states available to each capability
*/
typedef enum {
CAP_CLEAR=0, /* The flag is cleared/disabled */
CAP_SET=1 /* The flag is set/enabled */
} cap_flag_value_t;
/*
* User-space capability manipulation routines
*/
typedef unsigned cap_mode_t;
#define CAP_MODE_UNCERTAIN ((cap_mode_t) 0)
#define CAP_MODE_NOPRIV ((cap_mode_t) 1)
#define CAP_MODE_PURE1E_INIT ((cap_mode_t) 2)
#define CAP_MODE_PURE1E ((cap_mode_t) 3)
/* libcap/cap_alloc.c */
extern cap_t cap_dup(cap_t);
extern int cap_free(void *);
extern cap_t cap_init(void);
extern cap_iab_t cap_iab_init(void);
/* libcap/cap_flag.c */
extern int cap_get_flag(cap_t, cap_value_t, cap_flag_t, cap_flag_value_t *);
extern int cap_set_flag(cap_t, cap_flag_t, int, const cap_value_t *,
cap_flag_value_t);
extern int cap_clear(cap_t);
extern int cap_clear_flag(cap_t, cap_flag_t);
extern cap_flag_value_t cap_iab_get_vector(cap_iab_t, cap_iab_vector_t,
cap_value_t);
extern int cap_iab_set_vector(cap_iab_t, cap_iab_vector_t, cap_value_t,
cap_flag_value_t);
extern int cap_iab_fill(cap_iab_t, cap_iab_vector_t, cap_t, cap_flag_t);
/* libcap/cap_file.c */
extern cap_t cap_get_fd(int);
extern cap_t cap_get_file(const char *);
extern uid_t cap_get_nsowner(cap_t);
extern int cap_set_fd(int, cap_t);
extern int cap_set_file(const char *, cap_t);
extern int cap_set_nsowner(cap_t, uid_t);
/* libcap/cap_proc.c */
extern cap_t cap_get_proc(void);
extern cap_t cap_get_pid(pid_t);
extern int cap_set_proc(cap_t);
extern int cap_get_bound(cap_value_t);
extern int cap_drop_bound(cap_value_t);
#define CAP_IS_SUPPORTED(cap) (cap_get_bound(cap) >= 0)
extern int cap_get_ambient(cap_value_t);
extern int cap_set_ambient(cap_value_t, cap_flag_value_t);
extern int cap_reset_ambient(void);
#define CAP_AMBIENT_SUPPORTED() (cap_get_ambient(CAP_CHOWN) >= 0)
/* libcap/cap_extint.c */
extern ssize_t cap_size(cap_t);
extern ssize_t cap_copy_ext(void *, cap_t, ssize_t);
extern cap_t cap_copy_int(const void *);
/* libcap/cap_text.c */
extern cap_t cap_from_text(const char *);
extern char * cap_to_text(cap_t, ssize_t *);
extern int cap_from_name(const char *, cap_value_t *);
extern char * cap_to_name(cap_value_t);
extern char * cap_iab_to_text(cap_iab_t iab);
extern cap_iab_t cap_iab_from_text(const char *text);
#define CAP_DIFFERS(result, flag) (((result) & (1 << (flag))) != 0)
extern int cap_compare(cap_t, cap_t);
/* libcap/cap_proc.c */
extern void cap_set_syscall(long int (*new_syscall)(long int,
long int, long int, long int),
long int (*new_syscall6)(long int,
long int, long int, long int,
long int, long int, long int));
extern int cap_set_mode(cap_mode_t flavor);
extern cap_mode_t cap_get_mode(void);
extern const char *cap_mode_name(cap_mode_t flavor);
extern unsigned cap_get_secbits(void);
extern int cap_set_secbits(unsigned bits);
extern int cap_prctl(long int pr_cmd, long int arg1, long int arg2,
long int arg3, long int arg4, long int arg5);
extern int cap_prctlw(long int pr_cmd, long int arg1, long int arg2,
long int arg3, long int arg4, long int arg5);
extern int cap_setuid(uid_t uid);
extern int cap_setgroups(gid_t gid, size_t ngroups, const gid_t groups[]);
extern cap_iab_t cap_iab_get_proc(void);
extern int cap_iab_set_proc(cap_iab_t iab);
typedef struct cap_launch_s *cap_launch_t;
extern cap_launch_t cap_new_launcher(const char *arg0, const char * const *argv,
const char * const *envp);
extern void cap_launcher_callback(cap_launch_t attr,
int (callback_fn)(void *detail));
extern void cap_launcher_setuid(cap_launch_t attr, uid_t uid);
extern void cap_launcher_setgroups(cap_launch_t attr, gid_t gid,
int ngroups, const gid_t *groups);
extern void cap_launcher_set_mode(cap_launch_t attr, cap_mode_t flavor);
extern cap_iab_t cap_launcher_set_iab(cap_launch_t attr, cap_iab_t iab);
extern void cap_launcher_set_chroot(cap_launch_t attr, const char *chroot);
extern pid_t cap_launch(cap_launch_t attr, void *data);
/*
* system calls - look to libc for function to system call
* mapping. Note, libcap does not use capset directly, but permits the
* cap_set_syscall() to redirect the system call function.
*/
extern int capget(cap_user_header_t header, cap_user_data_t data);
extern int capset(cap_user_header_t header, const cap_user_data_t data);
/* deprecated - use cap_get_pid() */
extern int capgetp(pid_t pid, cap_t cap_d);
/* not valid with filesystem capability support - use cap_set_proc() */
extern int capsetp(pid_t pid, cap_t cap_d);
#ifdef __cplusplus
}
#endif
#endif /* _SYS_CAPABILITY_H */
SILENT KILLER Tool