Searched refs:CAP_SETUID (Results 1 – 7 of 7) sorted by relevance
/linux-4.4.14/include/uapi/linux/ |
D | capability.h | 142 #define CAP_SETUID 7 macro
|
/linux-4.4.14/security/keys/ |
D | persistent.c | 149 !ns_capable(ns, CAP_SETUID)) in keyctl_get_persistent()
|
/linux-4.4.14/net/core/ |
D | scm.c | 59 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/linux-4.4.14/kernel/ |
D | user_namespace.c | 777 return map_write(file, buf, size, ppos, CAP_SETUID, in proc_uid_map_write() 827 if (cap_setid == CAP_SETUID) { in new_idmap_permitted()
|
D | sys.c | 488 !ns_capable(old->user_ns, CAP_SETUID)) in SYSCALL_DEFINE2() 497 !ns_capable(old->user_ns, CAP_SETUID)) in SYSCALL_DEFINE2() 551 if (ns_capable(old->user_ns, CAP_SETUID)) { in SYSCALL_DEFINE1() 608 if (!ns_capable(old->user_ns, CAP_SETUID)) { in SYSCALL_DEFINE3() 766 ns_capable(old->user_ns, CAP_SETUID)) { in SYSCALL_DEFINE1()
|
/linux-4.4.14/security/ |
D | commoncap.c | 550 if (!capable(CAP_SETUID) || in cap_bprm_set_creds()
|
/linux-4.4.14/security/integrity/ima/ |
D | ima_policy.c | 236 if (has_capability_noaudit(current, CAP_SETUID)) { in ima_match_rules()
|