Lines Matching refs:effective

45 			" effective capabilities. Therefore not raising all"
52 * cap_capable - Determine whether a task has a particular effective capability
59 * its effective set, returning 0 if it does, -ve if it does not.
193 * @effective: The place to record the effective set
200 int cap_capget(const struct task_struct *target, kernel_cap_t *effective,
208 *effective = cred->cap_effective;
234 * @effective: A pointer to the proposed new effective capabilities set
244 const kernel_cap_t *effective,
266 if (!cap_issubset(*effective, *permitted))
269 new->cap_effective = *effective;
588 bool *effective,
595 *effective = true;
617 return *effective ? ret : 0;
724 bool *effective, bool *has_fcap)
756 rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap);
780 * @effective: Do we have effective root privilege?
786 * updated. If we have become set UID root, the effective bit is set.
789 bool *effective, kuid_t root_uid)
816 * If only the real uid is 0, we do not set the effective bit.
819 *effective = true;
857 if ((__cap_grew(effective, ambient, new) &&
858 !(__cap_full(effective, new) &&
863 !__cap_full(effective, new)) ||
890 bool effective = false, has_fcap = false, is_setid;
897 ret = get_file_caps(bprm, file, &effective, &has_fcap);
903 handle_privileged_root(bprm, has_fcap, &effective, root_uid);
946 if (effective)
968 (effective ||
1056 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
1060 * {r,e,s}uid != 0, the permitted and effective capabilities are
1063 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
1066 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
1077 * effective sets will be retained.