Lines Matching defs:caps
88 * user namespace has all caps.
549 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
558 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
561 if (caps->magic_etc & VFS_CAP_REVISION_MASK)
565 __u32 permitted = caps->permitted.cap[i];
566 __u32 inheritable = caps->inheritable.cap[i];
599 struct vfs_cap_data *caps = (struct vfs_cap_data *) &data;
621 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps->magic_etc);
645 /* Limit the caps to the mounter of the filesystem
654 cpu_caps->permitted.cap[i] = le32_to_cpu(caps->data[i].permitted);
655 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps->data[i].inheritable);
696 printk(KERN_NOTICE "Invalid argument reading file caps for %s\n",
786 * 1) cap_effective has all caps
788 * 3) root is supposed to have all caps (SECURE_NOROOT)
795 * 2) something prevented setuid root getting all caps
850 /* if we have fs caps, clear dangerous personality flags */
877 /* File caps or setid cancels ambient. */
1103 * yet with increased caps.
1104 * So we check for increased caps on the target process.