Searched refs:smack_privileged_cred (Results 1 - 6 of 6) sorted by relevance
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_access.c | 641 * smack_privileged_cred - are all privilege requirements met by cred 650 bool smack_privileged_cred(int cap, const struct cred *cred) in smack_privileged_cred() function 696 return smack_privileged_cred(cap, current_cred()); in smack_privileged()
|
H A D | smack.h | 299 bool smack_privileged_cred(int cap, const struct cred *cred);
|
H A D | smack_lsm.c | 443 else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred)) in smk_ptrace_rule_check() 1824 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask() 4415 if (smack_privileged_cred(CAP_MAC_OVERRIDE, current_cred())) in smack_watch_key()
|
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_access.c | 641 * smack_privileged_cred - are all privilege requirements met by cred 650 bool smack_privileged_cred(int cap, const struct cred *cred) in smack_privileged_cred() function 695 return smack_privileged_cred(cap, current_cred()); in smack_privileged()
|
H A D | smack.h | 290 bool smack_privileged_cred(int cap, const struct cred *cred);
|
H A D | smack_lsm.c | 455 else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred)) in smk_ptrace_rule_check() 1929 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask() 4552 if (smack_privileged_cred(CAP_MAC_OVERRIDE, current_cred())) in smack_watch_key() 4884 if (smack_privileged_cred(CAP_MAC_OVERRIDE, current_cred())) in smack_uring_override_creds() 4898 if (smack_privileged_cred(CAP_MAC_ADMIN, current_cred())) in smack_uring_sqpoll()
|
Completed in 15 milliseconds