Searched refs:CAP_FOWNER (Results 1 – 12 of 12) sorted by relevance
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/hiawatha/files/ |
H A D | hiawatha.service | 13 CapabilityBoundingSet=CAP_NET_BIND_SERVICE CAP_CHOWN CAP_DAC_OVERRIDE CAP_FOWNER CAP_FSETID CAP_SET…
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/colord/colord/ |
H A D | 08a32b2379fb5582f4312e59bf51a2823df56276.patch | 27 … CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_DAC_OVERRIDE CAP_DAC_READ_SEARCH CAP_FOWNER CAP_IPC_OWNER CA…
|
/openbmc/linux/include/uapi/linux/ |
H A D | capability.h | 132 #define CAP_FOWNER 3 macro
|
/openbmc/linux/include/linux/ |
H A D | capability.h | 61 | BIT_ULL(CAP_FOWNER) \
|
/openbmc/linux/fs/crypto/ |
H A D | keyring.c | 844 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
|
/openbmc/linux/fs/xfs/ |
H A D | xfs_iops.c | 715 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_setattr_nonsize()
|
H A D | xfs_ioctl.c | 1221 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_ioctl_setattr_get_trans()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | vfat.rst | 51 the file, or it has CAP_FOWNER capability. But FAT
|
H A D | fscrypt.rst | 625 user or that the caller has CAP_FOWNER in the initial user namespace. 639 process have the CAP_FOWNER capability in a namespace with the file 649 the process have the CAP_FOWNER capability in the initial user
|
/openbmc/linux/fs/ |
H A D | inode.c | 2456 if (vfsuid_has_mapping(ns, vfsuid) && ns_capable(ns, CAP_FOWNER)) in inode_owner_or_capable()
|
H A D | namei.c | 2925 return !capable_wrt_inode_uidgid(idmap, inode, CAP_FOWNER); in __check_sticky()
|
/openbmc/linux/fs/gfs2/ |
H A D | inode.c | 1087 !uid_eq(ip->i_inode.i_uid, current_fsuid()) && !capable(CAP_FOWNER)) in gfs2_unlink_ok()
|