Lines Matching defs:caps
107 * user namespace has all caps.
345 static inline int bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps,
354 if (caps->magic_etc & VFS_CAP_FLAGS_EFFECTIVE)
357 if (caps->magic_etc & VFS_CAP_REVISION_MASK)
361 __u32 permitted = caps->permitted.cap[i];
362 __u32 inheritable = caps->inheritable.cap[i];
393 struct vfs_cap_data caps;
400 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps,
411 cpu_caps->magic_etc = magic_etc = le32_to_cpu(caps.magic_etc);
431 cpu_caps->permitted.cap[i] = le32_to_cpu(caps.data[i].permitted);
432 cpu_caps->inheritable.cap[i] = le32_to_cpu(caps.data[i].inheritable);
535 /* if we have fs caps, clear dangerous personality flags */
572 * 1) cap_effective has all caps
574 * 3) root is supposed to have all caps (SECURE_NOROOT)
780 * yet with increased caps.
781 * So we check for increased caps on the target process.