Searched refs:ns_capable_noaudit (Results 1 – 10 of 10) sorted by relevance
/openbmc/linux/include/linux/ |
H A D | capability.h | 150 extern bool ns_capable_noaudit(struct user_namespace *ns, int cap); 179 static inline bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function
|
/openbmc/linux/kernel/ |
H A D | capability.c | 399 bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() function 403 EXPORT_SYMBOL(ns_capable_noaudit);
|
H A D | ptrace.c | 282 return ns_capable_noaudit(ns, CAP_SYS_PTRACE); in ptrace_has_cap()
|
H A D | seccomp.c | 671 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in seccomp_prepare_filter()
|
/openbmc/linux/net/ |
H A D | sysctl_net.c | 48 if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) { in net_ctl_permissions()
|
/openbmc/linux/security/landlock/ |
H A D | syscalls.c | 425 !ns_capable_noaudit(current_user_ns(), CAP_SYS_ADMIN)) in SYSCALL_DEFINE2()
|
/openbmc/linux/fs/overlayfs/ |
H A D | inode.c | 429 return ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in ovl_can_list()
|
/openbmc/linux/fs/ |
H A D | xattr.c | 1316 bool trusted = ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN); in simple_xattr_list()
|
/openbmc/linux/net/vmw_vsock/ |
H A D | af_vsock.c | 795 vsk->trusted = ns_capable_noaudit(&init_user_ns, CAP_NET_ADMIN); in __vsock_create()
|
/openbmc/linux/io_uring/ |
H A D | io_uring.c | 3937 if (!ns_capable_noaudit(&init_user_ns, CAP_IPC_LOCK)) in io_uring_create()
|