/Linux-v5.10/security/safesetid/ |
D | lsm.c | 38 if (policy->type == UID) { in _setid_policy_lookup() 72 if (new_type == UID) in setid_policy_lookup() 119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 161 if (new_type == UID) { in id_permitted_for_cred() 180 if (new_type == UID) { in id_permitted_for_cred() 205 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 208 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) && in safesetid_task_fix_setuid() 209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid() 210 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid() 211 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID)) in safesetid_task_fix_setuid()
|
D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those 13 UID mappings.
|
D | securityfs.c | 53 if (rule->type == UID){ in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 124 if (pol->type == UID){ in verify_ruleset() 127 nrule->type = UID; in verify_ruleset() 211 if (policy_type == UID) { in handle_policy_update() 246 return handle_policy_update(file, buf, len, UID); in safesetid_uid_file_write()
|
D | lsm.h | 36 UID, enumerator
|
/Linux-v5.10/Documentation/admin-guide/ |
D | highuid.rst | 18 maximum UID/GID. They are limited by the maximum file size on the 20 corresponding to the UID in question. 27 (currently, the old 16-bit UID and GID are still written to disk, and 28 part of the former pad space is used to store separate 32-bit UID and 31 - Need to validate that OS emulation calls the 16-bit UID 33 uses the 32-bit UID system calls properly otherwise. 40 (need to support whatever new 32-bit UID system calls are added to 59 Filesystems with simple fixups to prevent 16-bit UID wraparound: 78 - make sure that the UID mapping feature of AX25 networking works properly
|
/Linux-v5.10/fs/quota/ |
D | quotaio_v1.h | 34 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
/Linux-v5.10/tools/perf/ |
D | perf-with-kcore.sh | 80 $SUDO chown $UID "$KCORE_DIR" 81 $SUDO chown $UID "$KCORE_DIR/kcore" 82 $SUDO chown $UID "$KCORE_DIR/kallsyms" 83 $SUDO chown $UID "$KCORE_DIR/modules"
|
/Linux-v5.10/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 5 UID/GID transitions from a given UID/GID to only those approved by a 8 allowing a user to set up user namespace UID/GID mappings. 57 to do process spawning and UID/GID transitions). Unfortunately, there are a 70 programs in the tree could change to any desired UID/GID in the context of their 103 mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>', 106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid 107 privileges, such as allowing a user to set up user namespace UID/GID mappings.
|
/Linux-v5.10/Documentation/s390/ |
D | pci.rst | 38 and setting of global functionality, like UID checking. 91 The unique identifier (UID) is defined when configuring an LPAR and is 110 - The domain is set from the zPCI function's UID as defined during the 121 a multi-Function device is set from the zPCI function's UID as defined
|
/Linux-v5.10/security/keys/ |
D | Kconfig | 19 to five standard keyrings: UID-specific, GID-specific, session, 43 bool "Enable register of persistent per-UID keyrings" 46 This option provides a register of persistent per-UID keyrings, 48 in the sense that they stay around after all processes of that UID
|
/Linux-v5.10/tools/testing/selftests/ir/ |
D | ir_loopback.sh | 7 if [ $UID != 0 ]; then
|
/Linux-v5.10/Documentation/security/ |
D | credentials.rst | 38 UID marked on the inode. 45 defined by the UID and the GID marked on the inode. 59 For instance an open file may send SIGIO to a task using the UID and EUID 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 171 UID 0. 234 * UNIX UID, GID, mode; 319 uid_t current_uid(void) Current's real UID 321 uid_t current_euid(void) Current's effective UID [all …]
|
/Linux-v5.10/tools/testing/selftests/bpf/ |
D | test_lirc_mode2.sh | 8 if [ $UID != 0 ]; then
|
D | test_flow_dissector.sh | 12 if [ $UID != 0 ]; then
|
/Linux-v5.10/tools/testing/selftests/memfd/ |
D | run_hugetlbfs_test.sh | 29 if [ $UID != 0 ]; then
|
/Linux-v5.10/Documentation/hwmon/ |
D | mc13783-adc.rst | 56 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No / 83 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
|
/Linux-v5.10/Documentation/filesystems/ |
D | quota.rst | 48 - UID/GID (depends on quota type) of user / group whose limit 51 - UID of a user who caused the event
|
/Linux-v5.10/tools/perf/trace/beauty/ |
D | statx.c | 59 P_FLAG(UID); in syscall_arg__scnprintf_statx_mask()
|
/Linux-v5.10/tools/testing/selftests/cpufreq/ |
D | main.sh | 42 if [ $UID != 0 ]; then
|
/Linux-v5.10/tools/testing/selftests/drivers/usb/usbip/ |
D | usbip_test.sh | 35 if [ $UID != 0 ]; then
|
/Linux-v5.10/Documentation/admin-guide/nfs/ |
D | nfs-idmapper.rst | 41 uid: Find the UID for the given user 43 user: Find the user name for the given UID
|
/Linux-v5.10/tools/testing/selftests/gpio/ |
D | gpio-mockup.sh | 39 if [ $UID != 0 ]; then
|
/Linux-v5.10/tools/testing/selftests/efivarfs/ |
D | efivarfs.sh | 20 if [ $UID != 0 ]; then
|
/Linux-v5.10/tools/testing/selftests/intel_pstate/ |
D | run.sh | 42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
|
/Linux-v5.10/include/linux/ceph/ |
D | ceph_features.h | 75 DEFINE_CEPH_FEATURE( 0, 1, UID)
|