Home
last modified time | relevance | path

Searched refs:INVALID_ID (Results 1 – 4 of 4) sorted by relevance

/openbmc/linux/security/safesetid/
H A Dlsm.c113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable()
127 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable()
196 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid()
220 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid()
243 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgroups()
H A Dlsm.h56 #define INVALID_ID (kid_t){.uid = INVALID_UID} macro
H A Dsecurityfs.c105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset()
/openbmc/u-boot/drivers/remoteproc/
H A Dk3_rproc.c20 #define INVALID_ID 0xffff macro
112 if (rproc->host_id != INVALID_ID) { in k3_rproc_start()
199 INVALID_ID); in k3_rproc_of_to_priv()
201 INVALID_ID); in k3_rproc_of_to_priv()