Searched refs:CAP_SETGID (Results 1 – 12 of 12) sorted by relevance
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/hiawatha/files/ |
H A D | hiawatha.service | 13 …ingSet=CAP_NET_BIND_SERVICE CAP_CHOWN CAP_DAC_OVERRIDE CAP_FOWNER CAP_FSETID CAP_SETGID CAP_SETUID
|
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 96 if (cap != CAP_SETUID && cap != CAP_SETGID) in safesetid_security_capable() 122 case CAP_SETGID: in safesetid_security_capable()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/colord/colord/ |
H A D | 08a32b2379fb5582f4312e59bf51a2823df56276.patch | 27 …CapabilityBoundingSet=~CAP_SETUID CAP_SETGID CAP_SETPCAP CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_CHOWN CA…
|
/openbmc/linux/include/uapi/linux/ |
H A D | capability.h | 153 #define CAP_SETGID 6 macro
|
/openbmc/linux/tools/testing/selftests/clone3/ |
H A D | clone3_cap_checkpoint_restore.c | 101 cap_value_t cap_values[] = { CAP_SETUID, CAP_SETGID }; in set_capability()
|
/openbmc/linux/kernel/ |
H A D | groups.c | 189 return ns_capable_setid(user_ns, CAP_SETGID) && in may_setgroups()
|
H A D | sys.c | 397 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid() 406 ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setregid() 456 if (ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setgid() 805 !ns_capable_setid(old->user_ns, CAP_SETGID)) in __sys_setresgid() 927 ns_capable_setid(old->user_ns, CAP_SETGID)) { in __sys_setfsgid()
|
H A D | user_namespace.c | 1138 return map_write(file, buf, size, ppos, CAP_SETGID, in proc_gid_map_write() 1179 } else if (cap_setid == CAP_SETGID) { in new_idmap_permitted()
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 111 In v5.9 we are adding support for limiting CAP_SETGID privileges as was done 114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add
|
/openbmc/linux/net/core/ |
H A D | scm.c | 60 gid_eq(gid, cred->sgid)) || ns_capable(cred->user_ns, CAP_SETGID))) { in scm_check_creds()
|
/openbmc/linux/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 464 cap_value_t cap_values[] = {CAP_SETUID, CAP_SETGID}; in drop_caps()
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_policy.c | 620 if (has_capability_noaudit(current, CAP_SETGID)) { in ima_match_rules()
|