kernel_cap_t      306 fs/proc/array.c 			kernel_cap_t *a)
kernel_cap_t      321 fs/proc/array.c 	kernel_cap_t cap_inheritable, cap_permitted, cap_effective,
kernel_cap_t       31 include/linux/capability.h 	kernel_cap_t permitted;
kernel_cap_t       32 include/linux/capability.h 	kernel_cap_t inheritable;
kernel_cap_t       37 include/linux/capability.h #define _KERNEL_CAP_T_SIZE     (sizeof(kernel_cap_t))
kernel_cap_t       46 include/linux/capability.h extern const kernel_cap_t __cap_empty_set;
kernel_cap_t       47 include/linux/capability.h extern const kernel_cap_t __cap_init_eff_set;
kernel_cap_t       85 include/linux/capability.h # define CAP_EMPTY_SET    ((kernel_cap_t){{ 0, 0 }})
kernel_cap_t       86 include/linux/capability.h # define CAP_FULL_SET     ((kernel_cap_t){{ ~0, CAP_LAST_U32_VALID_MASK }})
kernel_cap_t       87 include/linux/capability.h # define CAP_FS_SET       ((kernel_cap_t){{ CAP_FS_MASK_B0 \
kernel_cap_t       90 include/linux/capability.h # define CAP_NFSD_SET     ((kernel_cap_t){{ CAP_FS_MASK_B0 \
kernel_cap_t      118 include/linux/capability.h static inline kernel_cap_t cap_combine(const kernel_cap_t a,
kernel_cap_t      119 include/linux/capability.h 				       const kernel_cap_t b)
kernel_cap_t      121 include/linux/capability.h 	kernel_cap_t dest;
kernel_cap_t      126 include/linux/capability.h static inline kernel_cap_t cap_intersect(const kernel_cap_t a,
kernel_cap_t      127 include/linux/capability.h 					 const kernel_cap_t b)
kernel_cap_t      129 include/linux/capability.h 	kernel_cap_t dest;
kernel_cap_t      134 include/linux/capability.h static inline kernel_cap_t cap_drop(const kernel_cap_t a,
kernel_cap_t      135 include/linux/capability.h 				    const kernel_cap_t drop)
kernel_cap_t      137 include/linux/capability.h 	kernel_cap_t dest;
kernel_cap_t      142 include/linux/capability.h static inline kernel_cap_t cap_invert(const kernel_cap_t c)
kernel_cap_t      144 include/linux/capability.h 	kernel_cap_t dest;
kernel_cap_t      149 include/linux/capability.h static inline bool cap_isclear(const kernel_cap_t a)
kernel_cap_t      166 include/linux/capability.h static inline bool cap_issubset(const kernel_cap_t a, const kernel_cap_t set)
kernel_cap_t      168 include/linux/capability.h 	kernel_cap_t dest;
kernel_cap_t      175 include/linux/capability.h static inline kernel_cap_t cap_drop_fs_set(const kernel_cap_t a)
kernel_cap_t      177 include/linux/capability.h 	const kernel_cap_t __cap_fs_set = CAP_FS_SET;
kernel_cap_t      181 include/linux/capability.h static inline kernel_cap_t cap_raise_fs_set(const kernel_cap_t a,
kernel_cap_t      182 include/linux/capability.h 					    const kernel_cap_t permitted)
kernel_cap_t      184 include/linux/capability.h 	const kernel_cap_t __cap_fs_set = CAP_FS_SET;
kernel_cap_t      189 include/linux/capability.h static inline kernel_cap_t cap_drop_nfsd_set(const kernel_cap_t a)
kernel_cap_t      191 include/linux/capability.h 	const kernel_cap_t __cap_fs_set = CAP_NFSD_SET;
kernel_cap_t      195 include/linux/capability.h static inline kernel_cap_t cap_raise_nfsd_set(const kernel_cap_t a,
kernel_cap_t      196 include/linux/capability.h 					      const kernel_cap_t permitted)
kernel_cap_t      198 include/linux/capability.h 	const kernel_cap_t __cap_nfsd_set = CAP_NFSD_SET;
kernel_cap_t      129 include/linux/cred.h 	kernel_cap_t	cap_inheritable; /* caps our children can inherit */
kernel_cap_t      130 include/linux/cred.h 	kernel_cap_t	cap_permitted;	/* caps we're permitted */
kernel_cap_t      131 include/linux/cred.h 	kernel_cap_t	cap_effective;	/* caps we can actually use */
kernel_cap_t      132 include/linux/cred.h 	kernel_cap_t	cap_bset;	/* capability bounding set */
kernel_cap_t      133 include/linux/cred.h 	kernel_cap_t	cap_ambient;	/* Ambient capability set */
kernel_cap_t     1471 include/linux/lsm_hooks.h 	int (*capget)(struct task_struct *target, kernel_cap_t *effective,
kernel_cap_t     1472 include/linux/lsm_hooks.h 			kernel_cap_t *inheritable, kernel_cap_t *permitted);
kernel_cap_t     1474 include/linux/lsm_hooks.h 			const kernel_cap_t *effective,
kernel_cap_t     1475 include/linux/lsm_hooks.h 			const kernel_cap_t *inheritable,
kernel_cap_t     1476 include/linux/lsm_hooks.h 			const kernel_cap_t *permitted);
kernel_cap_t      137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
kernel_cap_t      139 include/linux/security.h 		      const kernel_cap_t *effective,
kernel_cap_t      140 include/linux/security.h 		      const kernel_cap_t *inheritable,
kernel_cap_t      141 include/linux/security.h 		      const kernel_cap_t *permitted);
kernel_cap_t      262 include/linux/security.h 		    kernel_cap_t *effective,
kernel_cap_t      263 include/linux/security.h 		    kernel_cap_t *inheritable,
kernel_cap_t      264 include/linux/security.h 		    kernel_cap_t *permitted);
kernel_cap_t      266 include/linux/security.h 		    const kernel_cap_t *effective,
kernel_cap_t      267 include/linux/security.h 		    const kernel_cap_t *inheritable,
kernel_cap_t      268 include/linux/security.h 		    const kernel_cap_t *permitted);
kernel_cap_t      520 include/linux/security.h 				   kernel_cap_t *effective,
kernel_cap_t      521 include/linux/security.h 				   kernel_cap_t *inheritable,
kernel_cap_t      522 include/linux/security.h 				   kernel_cap_t *permitted)
kernel_cap_t      529 include/linux/security.h 				   const kernel_cap_t *effective,
kernel_cap_t      530 include/linux/security.h 				   const kernel_cap_t *inheritable,
kernel_cap_t      531 include/linux/security.h 				   const kernel_cap_t *permitted)
kernel_cap_t       52 kernel/audit.h 	kernel_cap_t		permitted;
kernel_cap_t       53 kernel/audit.h 	kernel_cap_t		inheritable;
kernel_cap_t       56 kernel/audit.h 		kernel_cap_t	effective;	/* effective set of process */
kernel_cap_t       58 kernel/audit.h 	kernel_cap_t		ambient;
kernel_cap_t     1162 kernel/auditsc.c 			  kernel_cap_t *cap)
kernel_cap_t       27 kernel/capability.c const kernel_cap_t __cap_empty_set = CAP_EMPTY_SET;
kernel_cap_t      116 kernel/capability.c static inline int cap_get_target_pid(pid_t pid, kernel_cap_t *pEp,
kernel_cap_t      117 kernel/capability.c 				     kernel_cap_t *pIp, kernel_cap_t *pPp)
kernel_cap_t      153 kernel/capability.c 	kernel_cap_t pE, pI, pP;
kernel_cap_t      226 kernel/capability.c 	kernel_cap_t inheritable, permitted, effective;
kernel_cap_t       37 kernel/umh.c   static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
kernel_cap_t       38 kernel/umh.c   static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
kernel_cap_t      648 kernel/umh.c   	kernel_cap_t new_cap;
kernel_cap_t       34 security/apparmor/capability.c 	kernel_cap_t caps;
kernel_cap_t       29 security/apparmor/include/capability.h 	kernel_cap_t allow;
kernel_cap_t       30 security/apparmor/include/capability.h 	kernel_cap_t audit;
kernel_cap_t       31 security/apparmor/include/capability.h 	kernel_cap_t denied;
kernel_cap_t       32 security/apparmor/include/capability.h 	kernel_cap_t quiet;
kernel_cap_t       33 security/apparmor/include/capability.h 	kernel_cap_t kill;
kernel_cap_t       34 security/apparmor/include/capability.h 	kernel_cap_t extended;
kernel_cap_t      137 security/apparmor/lsm.c static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective,
kernel_cap_t      138 security/apparmor/lsm.c 			   kernel_cap_t *inheritable, kernel_cap_t *permitted)
kernel_cap_t      681 security/apparmor/policy_unpack.c 	kernel_cap_t tmpcap;
kernel_cap_t      137 security/commoncap.c 	const kernel_cap_t *caller_caps;
kernel_cap_t      199 security/commoncap.c int cap_capget(struct task_struct *target, kernel_cap_t *effective,
kernel_cap_t      200 security/commoncap.c 	       kernel_cap_t *inheritable, kernel_cap_t *permitted)
kernel_cap_t      243 security/commoncap.c 	       const kernel_cap_t *effective,
kernel_cap_t      244 security/commoncap.c 	       const kernel_cap_t *inheritable,
kernel_cap_t      245 security/commoncap.c 	       const kernel_cap_t *permitted)
kernel_cap_t      707 security/security.c 		     kernel_cap_t *effective,
kernel_cap_t      708 security/security.c 		     kernel_cap_t *inheritable,
kernel_cap_t      709 security/security.c 		     kernel_cap_t *permitted)
kernel_cap_t      716 security/security.c 		    const kernel_cap_t *effective,
kernel_cap_t      717 security/security.c 		    const kernel_cap_t *inheritable,
kernel_cap_t      718 security/security.c 		    const kernel_cap_t *permitted)
kernel_cap_t     2147 security/selinux/hooks.c static int selinux_capget(struct task_struct *target, kernel_cap_t *effective,
kernel_cap_t     2148 security/selinux/hooks.c 			  kernel_cap_t *inheritable, kernel_cap_t *permitted)
kernel_cap_t     2156 security/selinux/hooks.c 			  const kernel_cap_t *effective,
kernel_cap_t     2157 security/selinux/hooks.c 			  const kernel_cap_t *inheritable,
kernel_cap_t     2158 security/selinux/hooks.c 			  const kernel_cap_t *permitted)