Home
last modified time | relevance | path

Searched refs:setid (Results 1 – 4 of 4) sorted by relevance

/openbmc/linux/security/safesetid/
H A DKconfig3 bool "Gate setid transitions to limit CAP_SET{U/G}ID capabilities"
8 SafeSetID is an LSM module that gates the setid family of syscalls to
/openbmc/linux/Documentation/admin-guide/LSM/
H A DSafeSetID.rst4 SafeSetID is an LSM module that gates the setid family of syscalls to restrict
31 This SafeSetID LSM seeks to provide a solution for restricting setid
53 For candidate applications that would like to have restricted setid capabilities
55 setid capabilities from the application completely and refactor the process
69 namespace and give programs in the tree setid capabilities. In this way,
90 None of the other in-tree LSMs have the capability to gate setid transitions, or
99 This LSM hooks the setid syscalls to make sure transitions are allowed if an
106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid
/openbmc/linux/arch/x86/events/intel/
H A Duncore.c986 static int __init uncore_type_init(struct intel_uncore_type *type, bool setid) in uncore_type_init() argument
999 pmus[i].func_id = setid ? i : -1; in uncore_type_init()
1049 uncore_types_init(struct intel_uncore_type **types, bool setid) in uncore_types_init() argument
1054 ret = uncore_type_init(*types, setid); in uncore_types_init()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/procmail/procmail/
H A Dfrom-debian-to-fix-compile-errors.patch32 @@ -40,7 +40,7 @@ multigram: multigram.$(O) $(MG_OBJ) setid
58 _Makefile lock.log *core* targetdir.h setid setid.$(O) gethome \