Home
last modified time | relevance | path

Searched refs:CAP_SETGID (Results 1 – 12 of 12) sorted by relevance

/OK3568_Linux_fs/kernel/security/safesetid/
H A Dlsm.c96 if (cap != CAP_SETUID && cap != CAP_SETGID) in safesetid_security_capable()
129 case CAP_SETGID: in safesetid_security_capable()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-webserver/recipes-httpd/hiawatha/files/
H A Dhiawatha.service13 …ingSet=CAP_NET_BIND_SERVICE CAP_CHOWN CAP_DAC_OVERRIDE CAP_FOWNER CAP_FSETID CAP_SETGID CAP_SETUID
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/
H A Dcapability.h150 #define CAP_SETGID 6 macro
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/
H A Dcapability.h150 #define CAP_SETGID 6 macro
/OK3568_Linux_fs/kernel/include/uapi/linux/
H A Dcapability.h152 #define CAP_SETGID 6 macro
/OK3568_Linux_fs/kernel/tools/testing/selftests/clone3/
H A Dclone3_cap_checkpoint_restore.c101 cap_value_t cap_values[] = { CAP_SETUID, CAP_SETGID }; in set_capability()
/OK3568_Linux_fs/kernel/kernel/
H A Dgroups.c181 return ns_capable_setid(user_ns, CAP_SETGID) && in may_setgroups()
H A Dsys.c386 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid()
395 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid()
445 if (ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setgid()
757 if (!ns_capable_setid(old->user_ns, CAP_SETGID)) { in __sys_setresgid()
884 ns_capable_setid(old->user_ns, CAP_SETGID)) { in __sys_setfsgid()
H A Duser_namespace.c1117 return map_write(file, buf, size, ppos, CAP_SETGID, in proc_gid_map_write()
1158 } else if (cap_setid == CAP_SETGID) { in new_idmap_permitted()
/OK3568_Linux_fs/kernel/tools/testing/selftests/safesetid/
H A Dsafesetid-test.c272 cap_value_t cap_values[] = {CAP_SETUID, CAP_SETGID}; in drop_caps()
/OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/
H A DSafeSetID.rst111 In v5.9 we are adding support for limiting CAP_SETGID privileges as was done
114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add
/OK3568_Linux_fs/kernel/net/core/
H A Dscm.c59 gid_eq(gid, cred->sgid)) || ns_capable(cred->user_ns, CAP_SETGID))) { in scm_check_creds()