Home
last modified time | relevance | path

Searched refs:CAP_SETGID (Results 1 – 10 of 10) sorted by relevance

/linux-6.6.21/security/safesetid/
Dlsm.c96 if (cap != CAP_SETUID && cap != CAP_SETGID) in safesetid_security_capable()
122 case CAP_SETGID: in safesetid_security_capable()
/linux-6.6.21/include/uapi/linux/
Dcapability.h153 #define CAP_SETGID 6 macro
/linux-6.6.21/tools/testing/selftests/clone3/
Dclone3_cap_checkpoint_restore.c101 cap_value_t cap_values[] = { CAP_SETUID, CAP_SETGID }; in set_capability()
/linux-6.6.21/kernel/
Dgroups.c189 return ns_capable_setid(user_ns, CAP_SETGID) && in may_setgroups()
Dsys.c397 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid()
406 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid()
456 if (ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setgid()
805 !ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setresgid()
927 ns_capable_setid(old->user_ns, CAP_SETGID)) { in __sys_setfsgid()
Duser_namespace.c1138 return map_write(file, buf, size, ppos, CAP_SETGID, in proc_gid_map_write()
1179 } else if (cap_setid == CAP_SETGID) { in new_idmap_permitted()
/linux-6.6.21/Documentation/admin-guide/LSM/
DSafeSetID.rst111 In v5.9 we are adding support for limiting CAP_SETGID privileges as was done
114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add
/linux-6.6.21/net/core/
Dscm.c60 gid_eq(gid, cred->sgid)) || ns_capable(cred->user_ns, CAP_SETGID))) { in scm_check_creds()
/linux-6.6.21/tools/testing/selftests/safesetid/
Dsafesetid-test.c464 cap_value_t cap_values[] = {CAP_SETUID, CAP_SETGID}; in drop_caps()
/linux-6.6.21/security/integrity/ima/
Dima_policy.c618 if (has_capability_noaudit(current, CAP_SETGID)) { in ima_match_rules()