effective 216 arch/m68k/fpsp040/fpsp.h .set EXC_EA,12 | exception frame effective address effective 3294 arch/m68k/ifpsp060/src/fpsp.S # if the effective addressing mode was -() or ()+, then the address # effective 24713 arch/m68k/ifpsp060/src/fpsp.S # if the effective addressing mode was predecrement or postincrement, effective 3293 arch/m68k/ifpsp060/src/pfpsp.S # if the effective addressing mode was -() or ()+, then the address # effective 14673 arch/m68k/ifpsp060/src/pfpsp.S # if the effective addressing mode was predecrement or postincrement, effective 64 include/linux/bpf-cgroup.h struct bpf_prog_array __rcu *effective[MAX_BPF_ATTACH_TYPE]; effective 1471 include/linux/lsm_hooks.h int (*capget)(struct task_struct *target, kernel_cap_t *effective, effective 1474 include/linux/lsm_hooks.h const kernel_cap_t *effective, effective 137 include/linux/security.h extern int cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); effective 139 include/linux/security.h const kernel_cap_t *effective, effective 262 include/linux/security.h kernel_cap_t *effective, effective 266 include/linux/security.h const kernel_cap_t *effective, effective 520 include/linux/security.h kernel_cap_t *effective, effective 524 include/linux/security.h return cap_capget(target, effective, inheritable, permitted); effective 529 include/linux/security.h const kernel_cap_t *effective, effective 533 include/linux/security.h return cap_capset(new, old, effective, inheritable, permitted); effective 45 include/uapi/linux/capability.h __u32 effective; effective 56 kernel/audit.h kernel_cap_t effective; /* effective set of process */ effective 1275 kernel/auditsc.c audit_log_cap(ab, "cap_pe", &context->capset.cap.effective); effective 1494 kernel/auditsc.c audit_log_cap(ab, "old_pe", &axs->old_pcap.effective); effective 1498 kernel/auditsc.c audit_log_cap(ab, "pe", &axs->new_pcap.effective); effective 2466 kernel/auditsc.c ax->old_pcap.effective = old->cap_effective; effective 2471 kernel/auditsc.c ax->new_pcap.effective = new->cap_effective; effective 2488 kernel/auditsc.c context->capset.cap.effective = new->cap_effective; effective 61 kernel/bpf/cgroup.c cgrp->bpf.effective[type], effective 186 kernel/bpf/cgroup.c rcu_swap_protected(cgrp->bpf.effective[type], old_array, effective 203 kernel/bpf/cgroup.c #define NR ARRAY_SIZE(cgrp->bpf.effective) effective 508 kernel/bpf/cgroup.c struct bpf_prog_array *effective; effective 511 kernel/bpf/cgroup.c effective = rcu_dereference_protected(cgrp->bpf.effective[type], effective 515 kernel/bpf/cgroup.c cnt = bpf_prog_array_length(effective); effective 532 kernel/bpf/cgroup.c return bpf_prog_array_copy_to_user(effective, prog_ids, cnt); effective 652 kernel/bpf/cgroup.c cgrp->bpf.effective[type], skb, __bpf_prog_run_save_cb); effective 654 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], skb, effective 685 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sk, BPF_PROG_RUN); effective 729 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); effective 758 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], sock_ops, effective 777 kernel/bpf/cgroup.c allow = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, effective 936 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[type], &ctx, BPF_PROG_RUN); effective 960 kernel/bpf/cgroup.c prog_array = rcu_dereference(cgrp->bpf.effective[attach_type]); effective 1024 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[BPF_CGROUP_SETSOCKOPT], effective 1108 kernel/bpf/cgroup.c ret = BPF_PROG_RUN_ARRAY(cgrp->bpf.effective[BPF_CGROUP_GETSOCKOPT], effective 171 kernel/capability.c kdata[i].effective = pE.cap[i]; effective 226 kernel/capability.c kernel_cap_t inheritable, permitted, effective; effective 250 kernel/capability.c effective.cap[i] = kdata[i].effective; effective 255 kernel/capability.c effective.cap[i] = 0; effective 261 kernel/capability.c effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; effective 270 kernel/capability.c &effective, &inheritable, &permitted); effective 137 security/apparmor/lsm.c static int apparmor_capget(struct task_struct *target, kernel_cap_t *effective, effective 158 security/apparmor/lsm.c *effective = cap_intersect(*effective, effective 199 security/commoncap.c int cap_capget(struct task_struct *target, kernel_cap_t *effective, effective 207 security/commoncap.c *effective = cred->cap_effective; effective 243 security/commoncap.c const kernel_cap_t *effective, effective 265 security/commoncap.c if (!cap_issubset(*effective, *permitted)) effective 268 security/commoncap.c new->cap_effective = *effective; effective 530 security/commoncap.c bool *effective, effective 538 security/commoncap.c *effective = true; effective 565 security/commoncap.c return *effective ? ret : 0; effective 650 security/commoncap.c static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_fcap) effective 681 security/commoncap.c rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_fcap); effective 714 security/commoncap.c bool *effective, kuid_t root_uid) effective 744 security/commoncap.c *effective = true; effective 782 security/commoncap.c if ((__cap_grew(effective, ambient, new) && effective 783 security/commoncap.c !(__cap_full(effective, new) && effective 788 security/commoncap.c !__cap_full(effective, new)) || effective 811 security/commoncap.c bool effective = false, has_fcap = false, is_setid; effective 819 security/commoncap.c ret = get_file_caps(bprm, &effective, &has_fcap); effective 825 security/commoncap.c handle_privileged_root(bprm, has_fcap, &effective, root_uid); effective 868 security/commoncap.c if (effective) effective 891 security/commoncap.c (effective || effective 707 security/security.c kernel_cap_t *effective, effective 712 security/security.c effective, inheritable, permitted); effective 716 security/security.c const kernel_cap_t *effective, effective 721 security/security.c effective, inheritable, permitted); effective 2147 security/selinux/hooks.c static int selinux_capget(struct task_struct *target, kernel_cap_t *effective, effective 2156 security/selinux/hooks.c const kernel_cap_t *effective, effective 5066 sound/pci/hda/patch_ca0132.c bool effective; effective 5105 sound/pci/hda/patch_ca0132.c effective = ca0132_is_vnode_effective(codec, nid, &shared_nid); effective 5106 sound/pci/hda/patch_ca0132.c if (effective) { effective 5939 sound/pci/hda/patch_ca0132.c bool effective; effective 5953 sound/pci/hda/patch_ca0132.c effective = ca0132_is_vnode_effective(codec, nid, &shared_nid); effective 5954 sound/pci/hda/patch_ca0132.c if (effective) {