/linux/Documentation/translations/zh_CN/security/ |
H A D | credentials.rst | 198 * UNIX UID, GID, mode; 270 uid_t current_uid(void) Current's real UID 272 uid_t current_euid(void) Current's effective UID 274 uid_t current_fsuid(void) Current's file access UID 342 uid_t task_uid(task) Task's real UID 343 uid_t task_euid(task) Task's effective UID
|
H A D | IMA-templates.rst | 21 的IMA这是有必要的。例如,可能报告的信息包括索引节点的 UID/GID或索引节点
|
/linux/security/safesetid/ |
H A D | lsm.c | 39 if (policy->type == UID) { in _setid_policy_lookup() 73 if (new_type == UID) in setid_policy_lookup() 114 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 120 pr_warn("Operation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*uid transitions\n", in safesetid_security_capable() 153 if (new_type == UID) { in id_permitted_for_cred() 172 if (new_type == UID) { in id_permitted_for_cred() 173 pr_warn("UID transition ((%d,%d,%d) -> %d) blocked\n", in id_permitted_for_cred() 188 * set*uid to user under new cred struct, or the UID transition is allowed (by 197 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 200 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) in safesetid_task_fix_setuid() [all...] |
H A D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those 13 UID mappings.
|
H A D | securityfs.c | 38 /* Format of |buf| string should be <UID>:<UID> or <GID>:<GID> */ in parse_policy_line() 53 if (rule->type == UID){ in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 94 else /* Error, pol->type is neither UID or GID */ in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 124 if (pol->type == UID){ in verify_ruleset() 127 nrule->type = UID; in verify_ruleset() 214 if (policy_type == UID) { in handle_policy_update() 225 /* Error, policy type is neither UID o in handle_policy_update() [all...] |
H A D | lsm.h | 36 UID, enumerator 49 /* Flag to signal if rule is for UID's or GID's */ 63 //Flag to signal if ruleset is for UID's or GID's
|
/linux/Documentation/arch/s390/ |
H A D | pci.rst | 38 and setting of global functionality, like UID checking. 92 The user identifier (UID) may be defined as part of the machine 94 uid_is_unique attribute is 1 the platform guarantees that the UID is unique 95 within that instance and no devices with the same UID can be attached 99 Indicates whether the user identifier (UID) is guaranteed to be and remain 118 - The domain is set from the zPCI function's UID as defined during the 129 a multi-Function device is set from the zPCI function's UID as defined
|
/linux/fs/quota/ |
H A D | quotaio_v1.h | 34 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 5 UID/GID transitions from a given UID/GID to only those approved by a 8 allowing a user to set up user namespace UID/GID mappings. 57 to do process spawning and UID/GID transitions). Unfortunately, there are a 70 programs in the tree could change to any desired UID/GID in the context of their 103 mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>', 106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid 107 privileges, such as allowing a user to set up user namespace UID/GI [all...] |
/linux/Documentation/ABI/stable/ |
H A D | procfs-audit_loginuid | 1 What: Audit Login UID 8 read to get the audit login UID of process $pid as a
|
/linux/Documentation/virt/kvm/arm/ |
H A D | hypercalls.rst | 15 Specific Hypervisor Service Call" range with a UID of 16 ``28b46fb6-2ec5-11e9-a9ca-4b564d003a74``. This UID should be queried by the 17 guest using the standard "Call UID" function for the service range in 26 | Presence: | Mandatory for the KVM/arm64 UID |
|
/linux/security/keys/ |
H A D | Kconfig | 19 to five standard keyrings: UID-specific, GID-specific, session, 43 bool "Enable register of persistent per-UID keyrings" 46 This option provides a register of persistent per-UID keyrings, 48 in the sense that they stay around after all processes of that UID
|
/linux/tools/testing/selftests/ir/ |
H A D | ir_loopback.sh | 7 if [ $UID != 0 ]; then
|
/linux/Documentation/security/ |
H A D | credentials.rst | 38 UID marked on the inode. 45 defined by the UID and the GID marked on the inode. 59 For instance an open file may send SIGIO to a task using the UID and EUID 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 171 UID 0. 234 * UNIX UID, GID, mode; 319 uid_t current_uid(void) Current's real UID 321 uid_t current_euid(void) Current's effective UID [all...] |
/linux/Documentation/hwmon/ |
H A D | mc13783-adc.rst | 56 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No / 83 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
|
/linux/tools/testing/selftests/memfd/ |
H A D | run_hugetlbfs_test.sh | 29 if [ $UID != 0 ]; then
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_lirc_mode2.sh | 9 if [ $UID != 0 ]; then
|
H A D | xsk_prereqs.sh | 16 if [ $UID != 0 ]; then
|
/linux/Documentation/filesystems/ |
H A D | quota.rst | 48 - UID/GID (depends on quota type) of user / group whose limit 51 - UID of a user who caused the event
|
/linux/drivers/gpu/drm/ci/xfails/ |
H A D | vkms-none-skips.txt | 213 # CPU: 0 UID: 0 PID: 27 Comm: kworker/u8:1 Not tainted 6.11.0-rc5-g5d3429a7e9aa #1 267 # CPU: 1 UID: 0 PID: 1250 Comm: kms_cursor_crc Not tainted 6.13.0-rc2-ge95c88d68ac3 #1 320 # CPU: 0 UID: 0 PID: 119 Comm: kworker/u8:6 Tainted: G W 6.13.0-rc2-ge95c88d68ac3 #1 373 # CPU: 0 UID: 0 PID: 2933 Comm: kms_cursor_crc Not tainted 6.13.0-rc2-g5219242748c8 #1 426 # CPU: 1 UID: 0 PID: 11 Comm: kworker/u8:0 Tainted: G W 6.13.0-rc2-g5219242748c8 #1 479 # CPU: 0 UID: 0 PID: 2933 Comm: kms_cursor_crc Not tainted 6.13.0-rc2-g5219242748c8 #1 532 # CPU: 1 UID: 0 PID: 11 Comm: kworker/u8:0 Tainted: G W 6.13.0-rc2-g5219242748c8 #1 585 # CPU: 0 UID: 0 PID: 2933 Comm: kms_cursor_crc Not tainted 6.13.0-rc2-g5219242748c8 #1 638 # CPU: 1 UID: 0 PID: 11 Comm: kworker/u8:0 Tainted: G W 6.13.0-rc2-g5219242748c8 #1 691 # CPU: 0 UID [all...] |
/linux/Documentation/admin-guide/namespaces/ |
H A D | resource-control.rst | 7 a set of processes is allowed to switch their UID. On a system
|
/linux/tools/testing/selftests/pcie_bwctrl/ |
H A D | set_pcie_cooling_state.sh | 16 if [ $UID != 0 ]; then
|
/linux/tools/testing/selftests/drivers/usb/usbip/ |
H A D | usbip_test.sh | 35 if [ $UID != 0 ]; then
|
/linux/Documentation/admin-guide/nfs/ |
H A D | nfs-idmapper.rst | 41 uid: Find the UID for the given user 43 user: Find the user name for the given UID
|
/linux/tools/testing/selftests/cpufreq/ |
H A D | main.sh | 44 if [ $UID != 0 ]; then
|