capset           1473 include/linux/lsm_hooks.h 	int (*capset)(struct cred *new, const struct cred *old,
capset           1831 include/linux/lsm_hooks.h 	struct hlist_head capset;
capset            183 kernel/audit.h 		} capset;
capset           1272 kernel/auditsc.c 		audit_log_format(ab, "pid=%d", context->capset.pid);
capset           1273 kernel/auditsc.c 		audit_log_cap(ab, "cap_pi", &context->capset.cap.inheritable);
capset           1274 kernel/auditsc.c 		audit_log_cap(ab, "cap_pp", &context->capset.cap.permitted);
capset           1275 kernel/auditsc.c 		audit_log_cap(ab, "cap_pe", &context->capset.cap.effective);
capset           1276 kernel/auditsc.c 		audit_log_cap(ab, "cap_pa", &context->capset.cap.ambient);
capset           2487 kernel/auditsc.c 	context->capset.pid = task_tgid_nr(current);
capset           2488 kernel/auditsc.c 	context->capset.cap.effective   = new->cap_effective;
capset           2489 kernel/auditsc.c 	context->capset.cap.inheritable = new->cap_effective;
capset           2490 kernel/auditsc.c 	context->capset.cap.permitted   = new->cap_permitted;
capset           2491 kernel/auditsc.c 	context->capset.cap.ambient     = new->cap_ambient;
capset            222 kernel/capability.c SYSCALL_DEFINE2(capset, cap_user_header_t, header, const cap_user_data_t, data)
capset            133 kernel/sys_ni.c COND_SYSCALL(capset);
capset           1349 security/commoncap.c 	LSM_HOOK_INIT(capset, cap_capset),
capset            720 security/security.c 	return call_int_hook(capset, 0, new, old,
capset           6839 security/selinux/hooks.c 	LSM_HOOK_INIT(capset, selinux_capset),