Lines Matching refs:effective
199 int cap_capget(struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument
207 *effective = cred->cap_effective; in cap_capget()
243 const kernel_cap_t *effective, in cap_capset() argument
265 if (!cap_issubset(*effective, *permitted)) in cap_capset()
268 new->cap_effective = *effective; in cap_capset()
530 bool *effective, in bprm_caps_from_vfs_caps() argument
538 *effective = true; in bprm_caps_from_vfs_caps()
565 return *effective ? ret : 0; in bprm_caps_from_vfs_caps()
650 static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_fcap) in get_file_caps() argument
681 rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap); in get_file_caps()
714 bool *effective, kuid_t root_uid) in handle_privileged_root() argument
744 *effective = true; in handle_privileged_root()
782 if ((__cap_grew(effective, ambient, new) && in nonroot_raised_pE()
783 !(__cap_full(effective, new) && in nonroot_raised_pE()
788 !__cap_full(effective, new)) || in nonroot_raised_pE()
811 bool effective = false, has_fcap = false, is_setid; in cap_bprm_set_creds() local
818 ret = get_file_caps(bprm, &effective, &has_fcap); in cap_bprm_set_creds()
824 handle_privileged_root(bprm, has_fcap, &effective, root_uid); in cap_bprm_set_creds()
867 if (effective) in cap_bprm_set_creds()
890 (effective || in cap_bprm_set_creds()