Searched refs:cap_capable (Results 1 – 6 of 6) sorted by relevance
| /linux/security/ ! |
| H A D | commoncap.c | 124 int cap_capable(const struct cred *cred, struct user_namespace *target_ns, in cap_capable() function 254 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 1356 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_task_prctl() 1455 return cap_capable(current_cred(), &init_user_ns, CAP_SYS_ADMIN, in cap_vm_enough_memory() 1474 ret = cap_capable(current_cred(), &init_user_ns, CAP_SYS_RAWIO, in cap_mmap_addr() 1491 LSM_HOOK_INIT(capable, cap_capable),
|
| /linux/include/trace/events/ ! |
| H A D | capability.h | 26 TRACE_EVENT(cap_capable,
|
| /linux/security/smack/ ! |
| H A D | smack_access.c | 717 rc = cap_capable(cred, &init_user_ns, cap, CAP_OPT_NONE); in smack_privileged_cred()
|
| /linux/security/apparmor/ ! |
| H A D | policy.c | 869 err = cap_capable(subj_cred, userns, cap, CAP_OPT_NONE); in policy_ns_capable()
|
| H A D | domain.c | 1443 cap_capable(current_cred(), &init_user_ns, CAP_MAC_OVERRIDE, in aa_change_profile()
|
| /linux/security/selinux/ ! |
| H A D | hooks.c | 3324 if (cap_capable(cred, &init_user_ns, CAP_MAC_ADMIN, opts)) in has_cap_mac_admin()
|