Lines Matching refs:cap

172 			kdata[i].effective = pE.cap[i];  in SYSCALL_DEFINE2()
173 kdata[i].permitted = pP.cap[i]; in SYSCALL_DEFINE2()
174 kdata[i].inheritable = pI.cap[i]; in SYSCALL_DEFINE2()
251 effective.cap[i] = kdata[i].effective; in SYSCALL_DEFINE2()
252 permitted.cap[i] = kdata[i].permitted; in SYSCALL_DEFINE2()
253 inheritable.cap[i] = kdata[i].inheritable; in SYSCALL_DEFINE2()
256 effective.cap[i] = 0; in SYSCALL_DEFINE2()
257 permitted.cap[i] = 0; in SYSCALL_DEFINE2()
258 inheritable.cap[i] = 0; in SYSCALL_DEFINE2()
262 effective.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
263 permitted.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
264 inheritable.cap[CAP_LAST_U32] &= CAP_LAST_U32_VALID_MASK; in SYSCALL_DEFINE2()
296 struct user_namespace *ns, int cap) in has_ns_capability() argument
301 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability()
317 bool has_capability(struct task_struct *t, int cap) in has_capability() argument
319 return has_ns_capability(t, &init_user_ns, cap); in has_capability()
336 struct user_namespace *ns, int cap) in has_ns_capability_noaudit() argument
341 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
359 bool has_capability_noaudit(struct task_struct *t, int cap) in has_capability_noaudit() argument
361 return has_ns_capability_noaudit(t, &init_user_ns, cap); in has_capability_noaudit()
375 bool ns_capable(struct user_namespace *ns, int cap) in ns_capable() argument
377 if (unlikely(!cap_valid(cap))) { in ns_capable()
378 pr_crit("capable() called with invalid cap=%u\n", cap); in ns_capable()
382 if (security_capable(current_cred(), ns, cap) == 0) { in ns_capable()
401 bool capable(int cap) in capable() argument
403 return ns_capable(&init_user_ns, cap); in capable()
421 int cap) in file_ns_capable() argument
423 if (WARN_ON_ONCE(!cap_valid(cap))) in file_ns_capable()
426 if (security_capable(file->f_cred, ns, cap) == 0) in file_ns_capable()
442 bool capable_wrt_inode_uidgid(const struct inode *inode, int cap) in capable_wrt_inode_uidgid() argument
446 return ns_capable(ns, cap) && kuid_has_mapping(ns, inode->i_uid) && in capable_wrt_inode_uidgid()