Lines Matching defs:caps

89 		 * user namespace has all caps.
487 * rootid_from_xattr - translate root uid of vfs caps
489 * @value: vfs caps value which may be modified by this function
511 * cap_convert_nscap - check vfs caps
515 * @ivalue: vfs caps value which may be modified by this function
586 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
594 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
597 if (caps->magic_etc & VFS_CAP_REVISION_MASK)
605 (new->cap_bset.val & caps->permitted.val) |
606 (new->cap_inheritable.val & caps->inheritable.val);
608 if (caps->permitted.val & ~new->cap_permitted.val)
621 * get_vfs_caps_from_disk - retrieve vfs caps from disk
643 struct vfs_cap_data *caps = (struct vfs_cap_data *) &data;
666 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps->magic_etc);
692 /* Limit the caps to the mounter of the filesystem
698 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted);
699 cpu_caps->inheritable.val = le32_to_cpu(caps->data[0].inheritable);
706 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32;
707 cpu_caps->inheritable.val += (u64)le32_to_cpu(caps->data[1].inheritable) << 32;
749 printk(KERN_NOTICE "Invalid argument reading file caps for %s\n",
839 * 1) cap_effective has all caps
841 * 3) root is supposed to have all caps (SECURE_NOROOT)
848 * 2) something prevented setuid root getting all caps
905 /* if we have fs caps, clear dangerous personality flags */
932 /* File caps or setid cancels ambient. */
1169 * yet with increased caps.
1170 * So we check for increased caps on the target process.