/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 38 if (policy->type == UID) { in _setid_policy_lookup() 72 if (new_type == UID) in setid_policy_lookup() 113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 152 if (new_type == UID) { in id_permitted_for_cred() 171 if (new_type == UID) { in id_permitted_for_cred() 196 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 199 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) && in safesetid_task_fix_setuid() 200 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid() 201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid() 202 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID)) in safesetid_task_fix_setuid()
|
H A D | securityfs.c | 53 if (rule->type == UID){ in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 124 if (pol->type == UID){ in verify_ruleset() 127 nrule->type = UID; in verify_ruleset() 214 if (policy_type == UID) { in handle_policy_update() 249 return handle_policy_update(file, buf, len, UID); in safesetid_uid_file_write()
|
H A D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those 13 UID mappings.
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | highuid.rst | 18 maximum UID/GID. They are limited by the maximum file size on the 20 corresponding to the UID in question. 27 (currently, the old 16-bit UID and GID are still written to disk, and 28 part of the former pad space is used to store separate 32-bit UID and 31 - Need to validate that OS emulation calls the 16-bit UID 33 uses the 32-bit UID system calls properly otherwise. 40 (need to support whatever new 32-bit UID system calls are added to 59 Filesystems with simple fixups to prevent 16-bit UID wraparound: 78 - make sure that the UID mapping feature of AX25 networking works properly
|
/openbmc/openbmc/poky/meta/recipes-extended/zip/zip-3.0/ |
H A D | 0001-unix-configure-use-_Static_assert-to-do-correct-dete.patch | 33 echo -- UID/GID test failed on compile - disabling old 16-bit UID/GID support 40 - echo -- UID not 2 bytes - disabling old 16-bit UID/GID support 43 - echo -- GID not 2 bytes - disabling old 16-bit UID/GID support 46 - echo -- 16-bit UIDs and GIDs - keeping old 16-bit UID/GID support 48 - echo -- test failed - conftest returned $r - disabling old 16-bit UID/GID support 51 + echo -- 16-bit UIDs and GIDs - keeping old 16-bit UID/GID support
|
/openbmc/linux/Documentation/arch/s390/ |
H A D | pci.rst | 38 and setting of global functionality, like UID checking. 92 The user identifier (UID) may be defined as part of the machine 94 uid_is_unique attribute is 1 the platform guarantees that the UID is unique 95 within that instance and no devices with the same UID can be attached 99 Indicates whether the user identifier (UID) is guaranteed to be and remain 118 - The domain is set from the zPCI function's UID as defined during the 129 a multi-Function device is set from the zPCI function's UID as defined
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 5 UID/GID transitions from a given UID/GID to only those approved by a 8 allowing a user to set up user namespace UID/GID mappings. 57 to do process spawning and UID/GID transitions). Unfortunately, there are a 70 programs in the tree could change to any desired UID/GID in the context of their 103 mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>', 106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid 107 privileges, such as allowing a user to set up user namespace UID/GID mappings.
|
/openbmc/linux/fs/quota/ |
H A D | quotaio_v1.h | 34 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 149.out | 9 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 15 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 45 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 51 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 67 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 73 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 103 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 109 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 127 sudo chown UID:GID /dev/mapper/qiotest-145-twofish-256-xts-plain64-sha1 133 sudo chown UID:GID /dev/mapper/qiotest-145-twofish-256-xts-plain64-sha1 [all …]
|
/openbmc/openbmc-build-scripts/ |
H A D | build-setup.sh | 148 chown "${UID}:${GROUPS[0]}" "${xtrct_path}" 205 RUN grep -q ${UID} /etc/passwd || useradd -d ${HOME} -m -u ${UID} -g ${GROUPS[0]} ${USER} 261 RUN grep -q ${UID} /etc/passwd || useradd -d ${HOME} -m -u ${UID} -g ${GROUPS[0]} ${USER}
|
H A D | build-rootfs-size-docker.sh | 70 RUN grep -q ${UID} /etc/passwd || useradd -d ${HOME} -m -u ${UID} -g ${GROUPS[0]} ${USER}
|
H A D | qemu-build.sh | 122 RUN grep -q ${UID} /etc/passwd || useradd -d ${HOME} -m -u ${UID} -g ${GROUPS[0]} ${USER}
|
/openbmc/qemu/tests/docker/dockerfiles/ |
H A D | python.docker | 25 ARG UID 27 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-xtensa-cross.docker | 34 ARG UID 36 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-tricore-cross.docker | 51 ARG UID 53 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-toolchain.docker | 46 ARG UID 48 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-loongarch-cross.docker | 52 ARG UID 54 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-legacy-test-cross.docker | 49 ARG UID 51 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
H A D | debian-hexagon-cross.docker | 52 ARG UID 54 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
/openbmc/qemu/tests/docker/ |
H A D | Makefile.include | 11 UID = $(if $(NOUSER),,$(shell id -u)) 48 --build-arg UID=$(UID)) \ 212 -u $(UID), \
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | procfs-audit_loginuid | 1 What: Audit Login UID 8 read to get the audit login UID of process $pid as a
|
/openbmc/linux/arch/arm/boot/dts/nuvoton/ |
H A D | nuvoton-wpcm450-supermicro-x9sci-ln4f.dts | 38 label = "UID button"; 50 label = "UID";
|
/openbmc/linux/security/keys/ |
H A D | Kconfig | 19 to five standard keyrings: UID-specific, GID-specific, session, 43 bool "Enable register of persistent per-UID keyrings" 46 This option provides a register of persistent per-UID keyrings, 48 in the sense that they stay around after all processes of that UID
|
/openbmc/qemu/docs/interop/ |
H A D | dbus.rst | 51 dbus-daemon can enforce various policies based on the UID/GID of the 53 helpers as different UID from QEMU and set appropriate policies. 57 - Everything the same UID
|
/openbmc/openbmc-build-scripts/scripts/ |
H A D | build-qemu-robot-docker.sh | 147 RUN grep -q ${UID} /etc/passwd || useradd -d ${HOME} -l -m -u ${UID} -g ${GROUPS[0]} \
|