Lines Matching full:effective

49 			" effective capabilities. Therefore not raising all"  in warn_setuid_and_fcaps_mixed()
56 * cap_capable_helper - Determine whether a task has a particular effective
64 * its effective set, returning 0 if it does, -ve if it does not.
109 * cap_capable - Determine whether a task has a particular effective capability
116 * its effective set, returning 0 if it does, -ve if it does not.
222 * @effective: The place to record the effective set
229 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument
237 *effective = cred->cap_effective; in cap_capget()
263 * @effective: A pointer to the proposed new effective capabilities set
273 const kernel_cap_t *effective, in cap_capset() argument
295 if (!cap_issubset(*effective, *permitted)) in cap_capset()
298 new->cap_effective = *effective; in cap_capset()
617 bool *effective, in bprm_caps_from_vfs_caps() argument
624 *effective = true; in bprm_caps_from_vfs_caps()
646 return *effective ? ret : 0; in bprm_caps_from_vfs_caps()
753 bool *effective, bool *has_fcap) in get_file_caps() argument
785 rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap); in get_file_caps()
809 * @effective: Do we have effective root privilege?
815 * updated. If we have become set UID root, the effective bit is set.
818 bool *effective, kuid_t root_uid) in handle_privileged_root() argument
845 * If only the real uid is 0, we do not set the effective bit. in handle_privileged_root()
848 *effective = true; in handle_privileged_root()
886 if ((__cap_grew(effective, ambient, new) && in nonroot_raised_pE()
887 !(__cap_full(effective, new) && in nonroot_raised_pE()
892 !__cap_full(effective, new)) || in nonroot_raised_pE()
919 bool effective = false, has_fcap = false, is_setid; in cap_bprm_creds_from_file() local
926 ret = get_file_caps(bprm, file, &effective, &has_fcap); in cap_bprm_creds_from_file()
932 handle_privileged_root(bprm, has_fcap, &effective, root_uid); in cap_bprm_creds_from_file()
975 if (effective) in cap_bprm_creds_from_file()
997 (effective || in cap_bprm_creds_from_file()
1085 * cap_emulate_setxuid() fixes the effective / permitted capabilities of
1089 * {r,e,s}uid != 0, the permitted and effective capabilities are
1092 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
1095 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
1106 * effective sets will be retained.