Lines Matching defs:capability

2 /* Common capabilities, needed by capability.o.
5 #include <linux/capability.h>
51 * cap_capable - Determine whether a task has a particular effective capability
53 * @ns: The user namespace in which we need the capability
54 * @cap: The capability to check for
57 * Determine whether the nominated task has the specified capability amongst
62 * cap_has_capability() returns 0 when a task has a capability, but the
70 /* See if cred has the capability in the target user namespace
94 * If you have a capability in a parent user ns, then you have
126 * If we have the ptrace capability to the target user_ns, then ptrace
163 * If parent has the ptrace capability to current's user_ns, then ptrace
190 * cap_capget - Retrieve a task's capability sets
191 * @target: The task from which to retrieve the capability sets
204 /* Derived from kernel/capability.c:sys_capget. */
221 * capability
238 * process's capability sets. The changes are made to the proposed new
292 * Returns 1 if security.capability has a value, meaning inode_killpriv()
382 if (strcmp(name, "capability") != 0)
447 /* This comes from a parent namespace. Return as a v2 capability */
492 * User requested a write of security.capability. If needed, update the
546 * Calculate the new process capability sets from the capability sets attached
590 * Extract the on-exec-apply capability sets for an executable file.
667 * Attempt to get the on-exec apply capability sets for an executable file from
687 * explicit that capability bits are limited to s_user_ns and its
744 * If the legacy file capability is set, then don't set privs
755 * capability sets for the file.
977 /* security.capability gets namespaced */
1159 * Implement PR_CAPBSET_DROP. Attempt to remove the specified capability from
1222 * capability-based-privilege environment.
1340 * capability security module. Returns 0 if this mapping should be allowed
1389 "capability");
1393 DEFINE_LSM(capability) = {
1394 .name = "capability",