Searched refs:cap_capable (Results 1 – 6 of 6) sorted by relevance
/linux-6.12.1/security/ |
D | commoncap.c | 67 int cap_capable(const struct cred *cred, struct user_namespace *targ_ns, in cap_capable() function 225 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 1305 || (cap_capable(current_cred(), in cap_task_prctl() 1403 return cap_capable(current_cred(), &init_user_ns, CAP_SYS_ADMIN, in cap_vm_enough_memory() 1422 ret = cap_capable(current_cred(), &init_user_ns, CAP_SYS_RAWIO, in cap_mmap_addr() 1445 LSM_HOOK_INIT(capable, cap_capable),
|
/linux-6.12.1/security/smack/ |
D | smack_access.c | 657 rc = cap_capable(cred, &init_user_ns, cap, CAP_OPT_NONE); in smack_privileged_cred()
|
/linux-6.12.1/include/linux/ |
D | security.h | 160 extern int cap_capable(const struct cred *cred, struct user_namespace *ns, 630 return cap_capable(cred, ns, cap, opts); in security_capable()
|
/linux-6.12.1/security/apparmor/ |
D | policy.c | 796 err = cap_capable(subj_cred, userns, cap, CAP_OPT_NONE); in policy_ns_capable()
|
D | domain.c | 1382 cap_capable(current_cred(), &init_user_ns, CAP_MAC_OVERRIDE, in aa_change_profile()
|
/linux-6.12.1/security/selinux/ |
D | hooks.c | 3171 if (cap_capable(cred, &init_user_ns, CAP_MAC_ADMIN, opts)) in has_cap_mac_admin()
|