Searched refs:CAP_SETUID (Results 1 – 7 of 7) sorted by relevance
/Linux-v4.19/include/uapi/linux/ |
D | capability.h | 157 #define CAP_SETUID 7 macro
|
/Linux-v4.19/security/keys/ |
D | persistent.c | 151 !ns_capable(ns, CAP_SETUID)) in keyctl_get_persistent()
|
/Linux-v4.19/net/core/ |
D | scm.c | 60 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/Linux-v4.19/kernel/ |
D | sys.c | 516 !ns_capable(old->user_ns, CAP_SETUID)) in __sys_setreuid() 525 !ns_capable(old->user_ns, CAP_SETUID)) in __sys_setreuid() 584 if (ns_capable(old->user_ns, CAP_SETUID)) { in __sys_setuid() 646 if (!ns_capable(old->user_ns, CAP_SETUID)) { in __sys_setresuid() 814 ns_capable(old->user_ns, CAP_SETUID)) { in __sys_setfsuid()
|
D | user_namespace.c | 1047 return map_write(file, buf, size, ppos, CAP_SETUID, in proc_uid_map_write() 1097 if (cap_setid == CAP_SETUID) { in new_idmap_permitted()
|
/Linux-v4.19/security/ |
D | commoncap.c | 849 if (!ns_capable(new->user_ns, CAP_SETUID) || in cap_bprm_set_creds()
|
/Linux-v4.19/security/integrity/ima/ |
D | ima_policy.c | 307 if (has_capability_noaudit(current, CAP_SETUID)) { in ima_match_rules()
|