Searched refs:CAP_SETUID (Results  1 – 7 of 7) sorted by relevance
| /linux-4.4.14/include/uapi/linux/ | 
| D | capability.h | 142 #define CAP_SETUID           7  macro
  | 
| /linux-4.4.14/security/keys/ | 
| D | persistent.c | 149 		    !ns_capable(ns, CAP_SETUID))  in keyctl_get_persistent()
  | 
| /linux-4.4.14/net/core/ | 
| D | scm.c | 59 	      uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) &&  in scm_check_creds()
  | 
| /linux-4.4.14/kernel/ | 
| D | user_namespace.c | 777 	return map_write(file, buf, size, ppos, CAP_SETUID,  in proc_uid_map_write() 827 		if (cap_setid == CAP_SETUID) {  in new_idmap_permitted()
  | 
| D | sys.c | 488 		    !ns_capable(old->user_ns, CAP_SETUID))  in SYSCALL_DEFINE2() 497 		    !ns_capable(old->user_ns, CAP_SETUID))  in SYSCALL_DEFINE2() 551 	if (ns_capable(old->user_ns, CAP_SETUID)) {  in SYSCALL_DEFINE1() 608 	if (!ns_capable(old->user_ns, CAP_SETUID)) {  in SYSCALL_DEFINE3() 766 	    ns_capable(old->user_ns, CAP_SETUID)) {  in SYSCALL_DEFINE1()
  | 
| /linux-4.4.14/security/ | 
| D | commoncap.c | 550 		if (!capable(CAP_SETUID) ||  in cap_bprm_set_creds()
  | 
| /linux-4.4.14/security/integrity/ima/ | 
| D | ima_policy.c | 236 		if (has_capability_noaudit(current, CAP_SETUID)) {  in ima_match_rules()
  |