Home
last modified time | relevance | path

Searched refs:capset (Results 1 – 14 of 14) sorted by relevance

/linux-4.1.27/kernel/
Dauditsc.c1255 audit_log_format(ab, "pid=%d", context->capset.pid); in show_special()
1256 audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); in show_special()
1257 audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); in show_special()
1258 audit_log_cap(ab, "cap_pe", &context->capset.cap.effective); in show_special()
2344 context->capset.pid = task_pid_nr(current); in __audit_log_capset()
2345 context->capset.cap.effective = new->cap_effective; in __audit_log_capset()
2346 context->capset.cap.inheritable = new->cap_effective; in __audit_log_capset()
2347 context->capset.cap.permitted = new->cap_permitted; in __audit_log_capset()
Dcapability.c223 SYSCALL_DEFINE2(capset, cap_user_header_t, header, const cap_user_data_t, data) in SYSCALL_DEFINE2() argument
Daudit.h192 } capset; member
/linux-4.1.27/arch/parisc/kernel/
Dsyscall_table.S185 ENTRY_SAME(capset)
/linux-4.1.27/arch/powerpc/include/asm/
Dsystbl.h191 SYSCALL_SPU(capset)
/linux-4.1.27/Documentation/security/
Dcredentials.txt177 credentials, but can also be manipulated directly by the capset() system
181 itself to its effective or permitted sets through capset(). This
306 task to alter another's credentials. This means the capset() system call is no
/linux-4.1.27/arch/s390/kernel/
Dcompat_wrapper.c132 COMPAT_SYSCALL_WRAP2(capset, cap_user_header_t, header, const cap_user_data_t, data);
/linux-4.1.27/arch/x86/syscalls/
Dsyscall_64.tbl135 126 common capset sys_capset
Dsyscall_32.tbl194 185 i386 capset sys_capset
/linux-4.1.27/security/
Dcapability.c958 set_to_cap_if_null(ops, capset); in security_fixup_ops()
Dsecurity.c196 return security_ops->capset(new, old, in security_capset()
/linux-4.1.27/include/linux/
Dsecurity.h1476 int (*capset) (struct cred *new, member
/linux-4.1.27/security/selinux/
Dhooks.c5856 .capset = selinux_capset,
/linux-4.1.27/init/
DKconfig1371 setgid, and capset.