Lines Matching refs:cap
173 kdata[i].effective = pE.cap[i]; in SYSCALL_DEFINE2()
174 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2()
175 kdata[i].inheritable = pI.cap[i]; in SYSCALL_DEFINE2()
252 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2()
253 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2()
254 inheritable.cap[i] = kdata[i].inheritable; in SYSCALL_DEFINE2()
257 effective.cap[i] = 0; in SYSCALL_DEFINE2()
258 permitted.cap[i] = 0; in SYSCALL_DEFINE2()
259 inheritable.cap[i] = 0; in SYSCALL_DEFINE2()
263 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
264 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
265 inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
297 struct user_namespace *ns, int cap) in has_ns_capability() argument
302 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability()
318 bool has_capability(struct task_struct *t, int cap) in has_capability() argument
320 return has_ns_capability(t, &init_user_ns, cap); in has_capability()
338 struct user_namespace *ns, int cap) in has_ns_capability_noaudit() argument
343 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
361 bool has_capability_noaudit(struct task_struct *t, int cap) in has_capability_noaudit() argument
363 return has_ns_capability_noaudit(t, &init_user_ns, cap); in has_capability_noaudit()
366 static bool ns_capable_common(struct user_namespace *ns, int cap, bool audit) in ns_capable_common() argument
370 if (unlikely(!cap_valid(cap))) { in ns_capable_common()
371 pr_crit("capable() called with invalid cap=%u\n", cap); in ns_capable_common()
375 capable = audit ? security_capable(current_cred(), ns, cap) : in ns_capable_common()
376 security_capable_noaudit(current_cred(), ns, cap); in ns_capable_common()
395 bool ns_capable(struct user_namespace *ns, int cap) in ns_capable() argument
397 return ns_capable_common(ns, cap, true); in ns_capable()
413 bool ns_capable_noaudit(struct user_namespace *ns, int cap) in ns_capable_noaudit() argument
415 return ns_capable_common(ns, cap, false); in ns_capable_noaudit()
429 bool capable(int cap) in capable() argument
431 return ns_capable(&init_user_ns, cap); in capable()
449 int cap) in file_ns_capable() argument
451 if (WARN_ON_ONCE(!cap_valid(cap))) in file_ns_capable()
454 if (security_capable(file->f_cred, ns, cap) == 0) in file_ns_capable()
483 bool capable_wrt_inode_uidgid(const struct inode *inode, int cap) in capable_wrt_inode_uidgid() argument
487 return ns_capable(ns, cap) && privileged_wrt_inode_uidgid(ns, inode); in capable_wrt_inode_uidgid()