Home
last modified time | relevance | path

Searched refs:ns_capable_noaudit (Results 1 – 11 of 11) sorted by relevance

/linux/include/linux/
H A Dcapability.h150 extern bool ns_capable_noaudit(struct user_namespace *ns, int cap);
179 static inline bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function
/linux/kernel/
H A Dcapability.c399 bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function
403 EXPORT_SYMBOL(ns_capable_noaudit);
H A Dptrace.c271 return ns_capable_noaudit(ns, CAP_SYS_PTRACE); in ptrace_has_cap()
H A Dseccomp.c671 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in seccomp_prepare_filter()
/linux/net/
H A Dsysctl_net.c48 if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) { in net_ctl_permissions()
/linux/fs/overlayfs/
H A Dxattrs.c109 return ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in ovl_can_list()
/linux/security/landlock/
H A Dsyscalls.c481 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in SYSCALL_DEFINE2()
/linux/fs/
H A Dxattr.c1310 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in simple_xattr_list()
H A Dnamespace.c4916 !ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN)) in do_statmount()
5062 !ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN)) in do_listmount()
/linux/net/vmw_vsock/
H A Daf_vsock.c781 vsk->trusted = ns_capable_noaudit(&init_user_ns, CAP_NET_ADMIN); in __vsock_create()
/linux/io_uring/
H A Dio_uring.c3488 if (!ns_capable_noaudit(&init_user_ns, CAP_IPC_LOCK)) in io_uring_create()