Lines Matching refs:effective

44 			" effective capabilities. Therefore not raising all"
51 * cap_capable - Determine whether a task has a particular effective capability
58 * its effective set, returning 0 if it does, -ve if it does not.
192 * @effective: The place to record the effective set
199 int cap_capget(struct task_struct *target, kernel_cap_t *effective,
207 *effective = cred->cap_effective;
233 * @effective: A pointer to the proposed new effective capabilities set
243 const kernel_cap_t *effective,
265 if (!cap_issubset(*effective, *permitted))
268 new->cap_effective = *effective;
551 bool *effective,
559 *effective = true;
586 return *effective ? ret : 0;
672 bool *effective, bool *has_fcap)
703 rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap);
727 * @effective: Do we have effective root privilege?
733 * updated. If we have become set UID root, the effective bit is set.
736 bool *effective, kuid_t root_uid)
763 * If only the real uid is 0, we do not set the effective bit.
766 *effective = true;
804 if ((__cap_grew(effective, ambient, new) &&
805 !(__cap_full(effective, new) &&
810 !__cap_full(effective, new)) ||
835 bool effective = false, has_fcap = false, is_setid;
842 ret = get_file_caps(bprm, file, &effective, &has_fcap);
848 handle_privileged_root(bprm, has_fcap, &effective, root_uid);
891 if (effective)
913 (effective ||
992 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
996 * {r,e,s}uid != 0, the permitted and effective capabilities are
999 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
1002 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
1013 * effective sets will be retained.