Lines Matching defs:capability

2 /* Common capabilities, needed by capability.o.
5 #include <linux/capability.h>
52 * cap_capable - Determine whether a task has a particular effective capability
54 * @targ_ns: The user namespace in which we need the capability
55 * @cap: The capability to check for
58 * Determine whether the nominated task has the specified capability amongst
63 * cap_has_capability() returns 0 when a task has a capability, but the
71 /* See if cred has the capability in the target user namespace
95 * If you have a capability in a parent user ns, then you have
127 * If we have the ptrace capability to the target user_ns, then ptrace
164 * If parent has the ptrace capability to current's user_ns, then ptrace
191 * cap_capget - Retrieve a task's capability sets
192 * @target: The task from which to retrieve the capability sets
205 /* Derived from kernel/capability.c:sys_capget. */
222 * capability
239 * process's capability sets. The changes are made to the proposed new
293 * Return: 1 if security.capability has a value, meaning inode_killpriv()
395 if (strcmp(name, "capability") != 0)
459 /* This comes from a parent namespace. Return as a v2 capability */
518 * User requested a write of security.capability. If needed, update the
583 * Calculate the new process capability sets from the capability sets attached
627 * Extract the on-exec-apply capability sets for an executable file.
719 * Attempt to get the on-exec apply capability sets for an executable file from
739 * explicit that capability bits are limited to s_user_ns and its
797 * If the legacy file capability is set, then don't set privs
808 * capability sets for the file.
1041 /* security.capability gets namespaced */
1231 * Implement PR_CAPBSET_DROP. Attempt to remove the specified capability from
1297 * capability-based-privilege environment.
1417 * capability security module.
1467 "capability");
1471 DEFINE_LSM(capability) = {
1472 .name = "capability",