Searched refs:CAP_SETUID (Results  1 – 10 of 10) sorted by relevance
| /Linux-v5.4/Documentation/admin-guide/LSM/ | 
| D | SafeSetID.rst | 14 to switch to a different user must be spawned with CAP_SETUID privileges.15 CAP_SETUID is granted to programs running as root or those running as a non-root
 16 user that have been explicitly given the CAP_SETUID runtime capability. It is
 25 since CAP_SETUID allows changing to any user on the system, including the root
 35 other untrusted uids without full blown CAP_SETUID capabilities. The non-root
 36 program would still need CAP_SETUID to do any kind of transition, but the
 38 of CAP_SETUID since the non-root program cannot take advantage of CAP_SETUID to
 41 services without having to give out CAP_SETUID all over the place just so that
 45 basically-root-equivalent CAP_SETUID.
 
 | 
| /Linux-v5.4/include/uapi/linux/ | 
| D | capability.h | 157 #define CAP_SETUID           7  macro
 | 
| /Linux-v5.4/security/safesetid/ | 
| D | lsm.c | 69 	if (cap != CAP_SETUID)  in safesetid_security_capable()
 | 
| /Linux-v5.4/security/keys/ | 
| D | persistent.c | 149 		    !ns_capable(ns, CAP_SETUID))  in keyctl_get_persistent()
 | 
| /Linux-v5.4/tools/testing/selftests/safesetid/ | 
| D | safesetid-test.c | 271 	cap_value_t cap_values[] = {CAP_SETUID, CAP_SETGID};  in drop_caps()
 | 
| /Linux-v5.4/net/core/ | 
| D | scm.c | 57 	      uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) &&  in scm_check_creds()
 | 
| /Linux-v5.4/kernel/ | 
| D | sys.c | 519 		    !ns_capable_setid(old->user_ns, CAP_SETUID))  in __sys_setreuid()528 		    !ns_capable_setid(old->user_ns, CAP_SETUID))  in __sys_setreuid()
 587 	if (ns_capable_setid(old->user_ns, CAP_SETUID)) {  in __sys_setuid()
 649 	if (!ns_capable_setid(old->user_ns, CAP_SETUID)) {  in __sys_setresuid()
 817 	    ns_capable_setid(old->user_ns, CAP_SETUID)) {  in __sys_setfsuid()
 
 | 
| D | user_namespace.c | 1045 	return map_write(file, buf, size, ppos, CAP_SETUID,  in proc_uid_map_write()1095 		if (cap_setid == CAP_SETUID) {  in new_idmap_permitted()
 
 | 
| /Linux-v5.4/security/ | 
| D | commoncap.c | 841 		if (!ns_capable(new->user_ns, CAP_SETUID) ||  in cap_bprm_set_creds()
 | 
| /Linux-v5.4/security/integrity/ima/ | 
| D | ima_policy.c | 402 		if (has_capability_noaudit(current, CAP_SETUID)) {  in ima_match_rules()
 |