capset 1473 include/linux/lsm_hooks.h int (*capset)(struct cred *new, const struct cred *old, capset 1831 include/linux/lsm_hooks.h struct hlist_head capset; capset 183 kernel/audit.h } capset; capset 1272 kernel/auditsc.c audit_log_format(ab, "pid=%d", context->capset.pid); capset 1273 kernel/auditsc.c audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable); capset 1274 kernel/auditsc.c audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted); capset 1275 kernel/auditsc.c audit_log_cap(ab, "cap_pe", &context->capset.cap.effective); capset 1276 kernel/auditsc.c audit_log_cap(ab, "cap_pa", &context->capset.cap.ambient); capset 2487 kernel/auditsc.c context->capset.pid = task_tgid_nr(current); capset 2488 kernel/auditsc.c context->capset.cap.effective = new->cap_effective; capset 2489 kernel/auditsc.c context->capset.cap.inheritable = new->cap_effective; capset 2490 kernel/auditsc.c context->capset.cap.permitted = new->cap_permitted; capset 2491 kernel/auditsc.c context->capset.cap.ambient = new->cap_ambient; capset 222 kernel/capability.c SYSCALL_DEFINE2(capset, cap_user_header_t, header, const cap_user_data_t, data) capset 133 kernel/sys_ni.c COND_SYSCALL(capset); capset 1349 security/commoncap.c LSM_HOOK_INIT(capset, cap_capset), capset 720 security/security.c return call_int_hook(capset, 0, new, old, capset 6839 security/selinux/hooks.c LSM_HOOK_INIT(capset, selinux_capset),