Searched refs:CAP_FOWNER (Results 1 – 10 of 10) sorted by relevance
| /linux/include/uapi/linux/ |
| H A D | capability.h | 133 #define CAP_FOWNER 3 macro
|
| /linux/include/linux/ |
| H A D | capability.h | 61 | BIT_ULL(CAP_FOWNER) \
|
| /linux/fs/crypto/ |
| H A D | keyring.c | 913 if (err == -ENOKEY && capable(CAP_FOWNER)) in fscrypt_verify_key_added()
|
| /linux/fs/xfs/ |
| H A D | xfs_iops.c | 838 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_setattr_nonsize()
|
| H A D | xfs_ioctl.c | 622 has_capability_noaudit(current, CAP_FOWNER), &tp); in xfs_ioctl_setattr_get_trans()
|
| /linux/Documentation/filesystems/ |
| H A D | vfat.rst | 51 the file, or it has CAP_FOWNER capability. But FAT
|
| H A D | fscrypt.rst | 702 user or that the caller has CAP_FOWNER in the initial user namespace. 716 process have the CAP_FOWNER capability in a namespace with the file 726 the process have the CAP_FOWNER capability in the initial user
|
| /linux/fs/ |
| H A D | inode.c | 2642 if (vfsuid_has_mapping(ns, vfsuid) && ns_capable(ns, CAP_FOWNER)) in inode_owner_or_capable()
|
| H A D | namei.c | 3231 return !capable_wrt_inode_uidgid(idmap, inode, CAP_FOWNER); in __check_sticky()
|
| /linux/fs/gfs2/ |
| H A D | inode.c | 1167 !uid_eq(ip->i_inode.i_uid, current_fsuid()) && !capable(CAP_FOWNER)) in gfs2_unlink_ok()
|