Searched refs:ns_capable_noaudit (Results 1 – 9 of 9) sorted by relevance
/linux-6.1.9/include/linux/ |
D | capability.h | 212 extern bool ns_capable_noaudit(struct user_namespace *ns, int cap); 241 static inline bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function
|
/linux-6.1.9/kernel/ |
D | capability.c | 413 bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function 417 EXPORT_SYMBOL(ns_capable_noaudit);
|
D | ptrace.c | 281 return ns_capable_noaudit(ns, CAP_SYS_PTRACE); in ptrace_has_cap()
|
D | seccomp.c | 662 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in seccomp_prepare_filter()
|
/linux-6.1.9/net/ |
D | sysctl_net.c | 48 if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) { in net_ctl_permissions()
|
/linux-6.1.9/security/landlock/ |
D | syscalls.c | 413 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in SYSCALL_DEFINE2()
|
/linux-6.1.9/fs/overlayfs/ |
D | inode.c | 420 return ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in ovl_can_list()
|
/linux-6.1.9/fs/ |
D | xattr.c | 1143 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in simple_xattr_list()
|
/linux-6.1.9/net/vmw_vsock/ |
D | af_vsock.c | 777 vsk->trusted = ns_capable_noaudit(&init_user_ns, CAP_NET_ADMIN); in __vsock_create()
|