Home
last modified time | relevance | path

Searched refs:UID (Results 1 – 25 of 61) sorted by relevance

123

/linux-6.3-rc2/security/safesetid/
A Dlsm.c38 if (policy->type == UID) { in _setid_policy_lookup()
72 if (new_type == UID) in setid_policy_lookup()
113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable()
152 if (new_type == UID) { in id_permitted_for_cred()
171 if (new_type == UID) { in id_permitted_for_cred()
196 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid()
199 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) && in safesetid_task_fix_setuid()
200 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
202 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID)) in safesetid_task_fix_setuid()
A DKconfig9 restrict UID/GID transitions from a given UID/GID to only those
13 UID mappings.
A Dsecurityfs.c53 if (rule->type == UID){ in parse_policy_line()
90 if (pol->type == UID) in insert_rule()
106 if (pol->type == UID) { in verify_ruleset()
124 if (pol->type == UID){ in verify_ruleset()
127 nrule->type = UID; in verify_ruleset()
211 if (policy_type == UID) { in handle_policy_update()
246 return handle_policy_update(file, buf, len, UID); in safesetid_uid_file_write()
A Dlsm.h36 UID, enumerator
/linux-6.3-rc2/Documentation/admin-guide/
A Dhighuid.rst18 maximum UID/GID. They are limited by the maximum file size on the
20 corresponding to the UID in question.
27 (currently, the old 16-bit UID and GID are still written to disk, and
28 part of the former pad space is used to store separate 32-bit UID and
31 - Need to validate that OS emulation calls the 16-bit UID
33 uses the 32-bit UID system calls properly otherwise.
40 (need to support whatever new 32-bit UID system calls are added to
59 Filesystems with simple fixups to prevent 16-bit UID wraparound:
78 - make sure that the UID mapping feature of AX25 networking works properly
/linux-6.3-rc2/Documentation/s390/
A Dpci.rst38 and setting of global functionality, like UID checking.
92 The user identifier (UID) may be defined as part of the machine
94 uid_is_unique attribute is 1 the platform guarantees that the UID is unique
95 within that instance and no devices with the same UID can be attached
99 Indicates whether the user identifier (UID) is guaranteed to be and remain
118 - The domain is set from the zPCI function's UID as defined during the
129 a multi-Function device is set from the zPCI function's UID as defined
/linux-6.3-rc2/fs/quota/
A Dquotaio_v1.h34 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
/linux-6.3-rc2/Documentation/admin-guide/LSM/
A DSafeSetID.rst5 UID/GID transitions from a given UID/GID to only those approved by a
8 allowing a user to set up user namespace UID/GID mappings.
57 to do process spawning and UID/GID transitions). Unfortunately, there are a
70 programs in the tree could change to any desired UID/GID in the context of their
103 mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>',
106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid
107 privileges, such as allowing a user to set up user namespace UID/GID mappings.
/linux-6.3-rc2/Documentation/ABI/stable/
A Dprocfs-audit_loginuid1 What: Audit Login UID
8 read to get the audit login UID of process $pid as a
/linux-6.3-rc2/arch/arm/boot/dts/
A Dnuvoton-wpcm450-supermicro-x9sci-ln4f.dts38 label = "UID button";
50 label = "UID";
/linux-6.3-rc2/security/keys/
A DKconfig19 to five standard keyrings: UID-specific, GID-specific, session,
43 bool "Enable register of persistent per-UID keyrings"
46 This option provides a register of persistent per-UID keyrings,
48 in the sense that they stay around after all processes of that UID
/linux-6.3-rc2/tools/testing/selftests/ir/
A Dir_loopback.sh7 if [ $UID != 0 ]; then
/linux-6.3-rc2/Documentation/security/
A Dcredentials.rst38 UID marked on the inode.
45 defined by the UID and the GID marked on the inode.
59 For instance an open file may send SIGIO to a task using the UID and EUID
72 from the real UID and GID that normally form the objective context of the
171 UID 0.
234 * UNIX UID, GID, mode;
319 uid_t current_uid(void) Current's real UID
321 uid_t current_euid(void) Current's effective UID
323 uid_t current_fsuid(void) Current's file access UID
399 uid_t task_uid(task) Task's real UID
[all …]
/linux-6.3-rc2/Documentation/hwmon/
A Dmc13783-adc.rst56 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No /
83 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
/linux-6.3-rc2/tools/testing/selftests/bpf/
A Dtest_lirc_mode2.sh9 if [ $UID != 0 ]; then
A Dxsk_prereqs.sh16 if [ $UID != 0 ]; then
/linux-6.3-rc2/tools/testing/selftests/memfd/
A Drun_hugetlbfs_test.sh29 if [ $UID != 0 ]; then
/linux-6.3-rc2/Documentation/filesystems/
A Dquota.rst48 - UID/GID (depends on quota type) of user / group whose limit
51 - UID of a user who caused the event
/linux-6.3-rc2/tools/testing/selftests/drivers/usb/usbip/
A Dusbip_test.sh35 if [ $UID != 0 ]; then
/linux-6.3-rc2/tools/perf/trace/beauty/
A Dstatx.c59 P_FLAG(UID); in syscall_arg__scnprintf_statx_mask()
/linux-6.3-rc2/tools/testing/selftests/cpufreq/
A Dmain.sh42 if [ $UID != 0 ]; then
/linux-6.3-rc2/Documentation/admin-guide/nfs/
A Dnfs-idmapper.rst41 uid: Find the UID for the given user
43 user: Find the user name for the given UID
/linux-6.3-rc2/tools/testing/selftests/efivarfs/
A Defivarfs.sh20 if [ $UID != 0 ]; then
/linux-6.3-rc2/tools/testing/selftests/intel_pstate/
A Drun.sh42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
/linux-6.3-rc2/tools/testing/selftests/cpu-hotplug/
A Dcpu-on-off-test.sh13 if [ $UID != 0 ]; then

Completed in 33 milliseconds

123