Searched refs:CAP_FOWNER (Results 1 – 10 of 10) sorted by relevance
/linux-6.6.21/include/uapi/linux/ |
D | capability.h | 132 #define CAP_FOWNER 3 macro
|
/linux-6.6.21/include/linux/ |
D | capability.h | 61 | BIT_ULL(CAP_FOWNER) \
|
/linux-6.6.21/fs/crypto/ |
D | keyring.c | 844 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
|
/linux-6.6.21/fs/xfs/ |
D | xfs_iops.c | 714 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_setattr_nonsize()
|
D | xfs_ioctl.c | 1209 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_ioctl_setattr_get_trans()
|
/linux-6.6.21/Documentation/filesystems/ |
D | vfat.rst | 51 the file, or it has CAP_FOWNER capability. But FAT
|
D | fscrypt.rst | 625 user or that the caller has CAP_FOWNER in the initial user namespace. 639 process have the CAP_FOWNER capability in a namespace with the file 649 the process have the CAP_FOWNER capability in the initial user
|
/linux-6.6.21/fs/ |
D | inode.c | 2413 if (vfsuid_has_mapping(ns, vfsuid) && ns_capable(ns, CAP_FOWNER)) in inode_owner_or_capable()
|
D | namei.c | 2927 return !capable_wrt_inode_uidgid(idmap, inode, CAP_FOWNER); in __check_sticky()
|
/linux-6.6.21/fs/gfs2/ |
D | inode.c | 1086 !uid_eq(ip->i_inode.i_uid, current_fsuid()) && !capable(CAP_FOWNER)) in gfs2_unlink_ok()
|