Searched refs:INVALID_ID (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 127 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 196 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 220 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid() 243 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgroups()
|
H A D | lsm.h | 56 #define INVALID_ID (kid_t){.uid = INVALID_UID} macro
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset()
|
/openbmc/u-boot/drivers/remoteproc/ |
H A D | k3_rproc.c | 20 #define INVALID_ID 0xffff macro 112 if (rproc->host_id != INVALID_ID) { in k3_rproc_start() 199 INVALID_ID); in k3_rproc_of_to_priv() 201 INVALID_ID); in k3_rproc_of_to_priv()
|