| /linux/security/safesetid/ |
| H A D | lsm.c | 47 } else if (policy->type == GID) { in _setid_policy_lookup() 75 else if (new_type == GID) in setid_policy_lookup() 128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 157 } else if (new_type == GID){ in id_permitted_for_cred() 176 } else if (new_type == GID) { in id_permitted_for_cred() 221 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid() 224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) && in safesetid_task_fix_setgid() 225 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) && in safesetid_task_fix_setgid() 226 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) && in safesetid_task_fix_setgid() 227 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID)) in safesetid_task_fix_setgid() [all …]
|
| H A D | securityfs.c | 58 } else if (rule->type == GID){ in parse_policy_line() 92 else if (pol->type == GID) in insert_rule() 110 } else if (pol->type == GID) { in verify_ruleset() 131 nrule->type = GID; in verify_ruleset() 219 } else if (policy_type == GID) { in handle_policy_update() 263 return handle_policy_update(file, buf, len, GID); in safesetid_gid_file_write()
|
| H A D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those
|
| H A D | lsm.h | 37 GID enumerator
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 48 这是由标记在索引节点上的UID和GID定义的。 69 与通常构成任务的对象上下文的真实UID和GID是相互独立的。 120 UID和GID由大多数(如果不是全部)Linux对象携带,即使有时它们需要被虚构出 129 而真实UID/GID 被用作对象上下文。对于任务,这并不总是正确的。 198 * UNIX UID, GID, mode; 271 gid_t current_gid(void) Current's real GID 273 gid_t current_egid(void) Current's effective GID 275 gid_t current_fsgid(void) Current's file access GID
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-driver-ib_srp | 18 destination GID. 118 Description: InfiniBand destination GID used for communication with the SRP 153 Description: InfiniBand destination GID specified in the parameters 182 Description: InfiniBand GID of the source port used for communication with
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-idmapper.rst | 42 gid: Find the GID for the given group 44 group: Find the group name for the given GID
|
| /linux/tools/perf/trace/beauty/ |
| H A D | statx.c | |
| /linux/Documentation/security/ |
| H A D | credentials.rst | 45 defined by the UID and the GID marked on the inode. 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 234 * UNIX UID, GID, mode; 320 gid_t current_gid(void) Current's real GID 322 gid_t current_egid(void) Current's effective GID 324 gid_t current_fsgid(void) Current's file access GID
|
| H A D | IMA-templates.rst | 15 the inode UID/GID or the LSM labels either of the inode and of the process 80 - 'igid': the inode GID;
|
| /linux/Documentation/admin-guide/perf/ |
| H A D | cxl.rst | 64 $# perf stat -a -e cxl_pmu_mem0.0/vid=VID,gid=GID,mask=MASK/
|
| /linux/Documentation/filesystems/ |
| H A D | quota.rst | 48 - UID/GID (depends on quota type) of user / group whose limit
|
| H A D | zonefs.rst | 169 * File ownership: The owner UID and GID of zone files is by default 0 (root) 170 but can be changed to any valid UID/GID.
|
| /linux/Documentation/security/keys/ |
| H A D | request-key.rst | 108 UID, GID, groups and security info of process A as if it was process A, 129 of them, and (b) it requires the same UID/GID/Groups all the way through.
|
| H A D | core.rst | 153 execve, even when the latter executes a set-UID or set-GID binary. A 158 The ownership of the thread keyring changes when the real UID and GID of 233 This permits a key's UID, GID and permissions mask to be changed. 291 SERIAL FLAGS USAGE EXPY PERM UID GID TYPE DESCRIPTION: SUMMARY 372 KEY_SPEC_GROUP_KEYRING -6 GID-specific keyring 767 requester's keyrings using the requester's security label, UID, GID and 1807 This program should set it UID and GID to those specified before attempting to
|
| /linux/drivers/infiniband/ |
| H A D | Kconfig | 74 This allows the user to config the default GID type that the CM
|
| /linux/Documentation/filesystems/nfs/ |
| H A D | rpc-cache.rst | 25 - mappings between local UID/GID and remote UID/GID for sites that
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-class-rnbd-client | 43 gid:<GID>
|
| /linux/drivers/net/ethernet/renesas/ |
| H A D | rtsn.h | 93 GID = TSNMHD + 0x0018, enumerator
|
| /linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
| H A D | switchdev.rst | 76 When a subfunction is RDMA capable, it has its own QP1, GID table, and RDMA
|
| /linux/usr/ |
| H A D | Kconfig | 50 If INITRAMFS_SOURCE points to a directory, files owned by this GID
|
| /linux/Documentation/admin-guide/sysctl/ |
| H A D | kernel.rst | 813 i386, m68k, sh, and sparc32), a fixed UID and GID will be returned to 814 applications that use the old 16-bit UID/GID system calls, if the 815 actual UID or GID would exceed 65535. 817 These sysctls allow you to change the value of the fixed UID and GID.
|
| /linux/Documentation/admin-guide/ |
| H A D | perf-security.rst | 62 effective GID, and supplementary group list).
|
| /linux/Documentation/networking/devlink/ |
| H A D | devlink-port.rst | 187 receive any RoCE packets through this VF/SF and RoCE GID table for this PCI
|
| /linux/Documentation/filesystems/caching/ |
| H A D | cachefiles.rst | 400 parameters with that object is created (UID, GID, security label) would be
|