effective         216 arch/m68k/fpsp040/fpsp.h 	.set	EXC_EA,12		| exception frame effective address
effective        3294 arch/m68k/ifpsp060/src/fpsp.S # if the effective addressing mode was -() or ()+, then the address	#
effective        24713 arch/m68k/ifpsp060/src/fpsp.S # if the effective addressing mode was predecrement or postincrement,
effective        3293 arch/m68k/ifpsp060/src/pfpsp.S # if the effective addressing mode was -() or ()+, then the address	#
effective        14673 arch/m68k/ifpsp060/src/pfpsp.S # if the effective addressing mode was predecrement or postincrement,
effective          64 include/linux/bpf-cgroup.h 	struct bpf_prog_array __rcu *effective[MAX_BPF_ATTACH_TYPE];
effective        1471 include/linux/lsm_hooks.h 	int (*capget)(struct task_struct *target, kernel_cap_t *effective,
effective        1474 include/linux/lsm_hooks.h 			const kernel_cap_t *effective,
effective         137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted);
effective         139 include/linux/security.h 		      const kernel_cap_t *effective,
effective         262 include/linux/security.h 		    kernel_cap_t *effective,
effective         266 include/linux/security.h 		    const kernel_cap_t *effective,
effective         520 include/linux/security.h 				   kernel_cap_t *effective,
effective         524 include/linux/security.h 	return cap_capget(target, effective, inheritable, permitted);
effective         529 include/linux/security.h 				   const kernel_cap_t *effective,
effective         533 include/linux/security.h 	return cap_capset(new, old, effective, inheritable, permitted);
effective          45 include/uapi/linux/capability.h         __u32 effective;
effective          56 kernel/audit.h 		kernel_cap_t	effective;	/* effective set of process */
effective        1275 kernel/auditsc.c 		audit_log_cap(ab, "cap_pe", &context->capset.cap.effective);
effective        1494 kernel/auditsc.c 			audit_log_cap(ab, "old_pe", &axs->old_pcap.effective);
effective        1498 kernel/auditsc.c 			audit_log_cap(ab, "pe", &axs->new_pcap.effective);
effective        2466 kernel/auditsc.c 	ax->old_pcap.effective   = old->cap_effective;
effective        2471 kernel/auditsc.c 	ax->new_pcap.effective   = new->cap_effective;
effective        2488 kernel/auditsc.c 	context->capset.cap.effective   = new->cap_effective;
effective          61 kernel/bpf/cgroup.c 				cgrp->bpf.effective[type],
effective         186 kernel/bpf/cgroup.c 	rcu_swap_protected(cgrp->bpf.effective[type], old_array,
effective         203 kernel/bpf/cgroup.c #define	NR ARRAY_SIZE(cgrp->bpf.effective)
effective         508 kernel/bpf/cgroup.c 	struct bpf_prog_array *effective;
effective         511 kernel/bpf/cgroup.c 	effective = rcu_dereference_protected(cgrp->bpf.effective[type],
effective         515 kernel/bpf/cgroup.c 		cnt = bpf_prog_array_length(effective);
effective         532 kernel/bpf/cgroup.c 		return bpf_prog_array_copy_to_user(effective, prog_ids, cnt);
effective         652 kernel/bpf/cgroup.c 			cgrp->bpf.effective[type], skb, __bpf_prog_run_save_cb);
effective         654 kernel/bpf/cgroup.c 		ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], skb,
effective         685 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sk, BPF_PROG_RUN);
effective         729 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN);
effective         758 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sock_ops,
effective         777 kernel/bpf/cgroup.c 	allow = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx,
effective         936 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN);
effective         960 kernel/bpf/cgroup.c 	prog_array = rcu_dereference(cgrp->bpf.effective[attach_type]);
effective        1024 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[BPF_CGROUP_SETSOCKOPT],
effective        1108 kernel/bpf/cgroup.c 	ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[BPF_CGROUP_GETSOCKOPT],
effective         171 kernel/capability.c 			kdata[i].effective = pE.cap[i];
effective         226 kernel/capability.c 	kernel_cap_t inheritable, permitted, effective;
effective         250 kernel/capability.c 		effective.cap[i] = kdata[i].effective;
effective         255 kernel/capability.c 		effective.cap[i] = 0;
effective         261 kernel/capability.c 	effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK;
effective         270 kernel/capability.c 			      &effective, &inheritable, &permitted);
effective         137 security/apparmor/lsm.c static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective,
effective         158 security/apparmor/lsm.c 			*effective = cap_intersect(*effective,
effective         199 security/commoncap.c int cap_capget(struct task_struct *target, kernel_cap_t *effective,
effective         207 security/commoncap.c 	*effective   = cred->cap_effective;
effective         243 security/commoncap.c 	       const kernel_cap_t *effective,
effective         265 security/commoncap.c 	if (!cap_issubset(*effective, *permitted))
effective         268 security/commoncap.c 	new->cap_effective   = *effective;
effective         530 security/commoncap.c 					  bool *effective,
effective         538 security/commoncap.c 		*effective = true;
effective         565 security/commoncap.c 	return *effective ? ret : 0;
effective         650 security/commoncap.c static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_fcap)
effective         681 security/commoncap.c 	rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap);
effective         714 security/commoncap.c 				   bool *effective, kuid_t root_uid)
effective         744 security/commoncap.c 		*effective = true;
effective         782 security/commoncap.c 	if ((__cap_grew(effective, ambient, new) &&
effective         783 security/commoncap.c 	     !(__cap_full(effective, new) &&
effective         788 security/commoncap.c 	     !__cap_full(effective, new)) ||
effective         811 security/commoncap.c 	bool effective = false, has_fcap = false, is_setid;
effective         819 security/commoncap.c 	ret = get_file_caps(bprm, &effective, &has_fcap);
effective         825 security/commoncap.c 	handle_privileged_root(bprm, has_fcap, &effective, root_uid);
effective         868 security/commoncap.c 	if (effective)
effective         891 security/commoncap.c 	     (effective ||
effective         707 security/security.c 		     kernel_cap_t *effective,
effective         712 security/security.c 				effective, inheritable, permitted);
effective         716 security/security.c 		    const kernel_cap_t *effective,
effective         721 security/security.c 				effective, inheritable, permitted);
effective        2147 security/selinux/hooks.c static int selinux_capget(struct task_struct *target, kernel_cap_t *effective,
effective        2156 security/selinux/hooks.c 			  const kernel_cap_t *effective,
effective        5066 sound/pci/hda/patch_ca0132.c 	bool effective;
effective        5105 sound/pci/hda/patch_ca0132.c 	effective = ca0132_is_vnode_effective(codec, nid, &shared_nid);
effective        5106 sound/pci/hda/patch_ca0132.c 	if (effective) {
effective        5939 sound/pci/hda/patch_ca0132.c 	bool effective;
effective        5953 sound/pci/hda/patch_ca0132.c 	effective = ca0132_is_vnode_effective(codec, nid, &shared_nid);
effective        5954 sound/pci/hda/patch_ca0132.c 	if (effective) {