| /linux/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 42 例如,在标准的UNIX文件系统中,这将由标记在索引节点上的UID定义。 48 这是由标记在索引节点上的UID和GID定义的。 60 名为 ``fcntl(F_SETOWN)`` 的任务给它的UID和EUID向一个任务发送SIGIO 69 与通常构成任务的对象上下文的真实UID和GID是相互独立的。 120 UID和GID由大多数(如果不是全部)Linux对象携带,即使有时它们需要被虚构出 129 而真实UID/GID 被用作对象上下文。对于任务,这并不总是正确的。 148 边界集限制了通过 ``execve()`` 继承的能力,特别是在以UID 0执行二进制文件时。 198 * UNIX UID, GID, mode; 270 uid_t current_uid(void) Current's real UID 272 uid_t current_euid(void) Current's effective UID [all …]
|
| /linux/security/safesetid/ |
| H A D | lsm.c | 39 if (policy->type == UID) { in _setid_policy_lookup() 73 if (new_type == UID) in setid_policy_lookup() 114 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 153 if (new_type == UID) { in id_permitted_for_cred() 172 if (new_type == UID) { in id_permitted_for_cred() 197 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 200 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) && in safesetid_task_fix_setuid() 201 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid() 202 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid() 203 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID)) in safesetid_task_fix_setuid()
|
| H A D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those 13 UID mappings.
|
| H A D | securityfs.c | 53 if (rule->type == UID){ in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 124 if (pol->type == UID){ in verify_ruleset() 127 nrule->type = UID; in verify_ruleset() 214 if (policy_type == UID) { in handle_policy_update() 249 return handle_policy_update(file, buf, len, UID); in safesetid_uid_file_write()
|
| H A D | lsm.h | 36 UID, enumerator
|
| /linux/Documentation/arch/s390/ |
| H A D | pci.rst | 38 and setting of global functionality, like UID checking. 92 The user identifier (UID) may be defined as part of the machine 94 uid_is_unique attribute is 1 the platform guarantees that the UID is unique 95 within that instance and no devices with the same UID can be attached 99 Indicates whether the user identifier (UID) is guaranteed to be and remain 118 - The domain is set from the zPCI function's UID as defined during the 129 a multi-Function device is set from the zPCI function's UID as defined
|
| /linux/fs/quota/ |
| H A D | quotaio_v1.h | 34 #define v1_dqoff(UID) ((loff_t)((UID) * sizeof (struct v1_disk_dqblk))) argument
|
| /linux/Documentation/ABI/stable/ |
| H A D | procfs-audit_loginuid | 1 What: Audit Login UID 8 read to get the audit login UID of process $pid as a
|
| /linux/arch/arm/boot/dts/nuvoton/ |
| H A D | nuvoton-wpcm450-supermicro-x9sci-ln4f.dts | 38 label = "UID button"; 50 label = "UID";
|
| /linux/tools/testing/selftests/ir/ |
| H A D | ir_loopback.sh | 7 if [ $UID != 0 ]; then
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 38 UID marked on the inode. 45 defined by the UID and the GID marked on the inode. 59 For instance an open file may send SIGIO to a task using the UID and EUID 72 from the real UID and GID that normally form the objective context of the 132 The UID and GID are carried by most, if not all, Linux objects, even if in 142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID 171 UID 0. 234 * UNIX UID, GID, mode; 319 uid_t current_uid(void) Current's real UID 321 uid_t current_euid(void) Current's effective UID [all …]
|
| /linux/Documentation/hwmon/ |
| H A D | mc13783-adc.rst | 56 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.30V / No / 83 7 General Purpose ADIN7 / UID / Die Temperature 0 - 2.4V / No /
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_lirc_mode2.sh | 9 if [ $UID != 0 ]; then
|
| H A D | xsk_prereqs.sh | 16 if [ $UID != 0 ]; then
|
| /linux/tools/testing/selftests/memfd/ |
| H A D | run_hugetlbfs_test.sh | 29 if [ $UID != 0 ]; then
|
| /linux/Documentation/filesystems/ |
| H A D | quota.rst | 48 - UID/GID (depends on quota type) of user / group whose limit 51 - UID of a user who caused the event
|
| /linux/Documentation/admin-guide/namespaces/ |
| H A D | resource-control.rst | 7 a set of processes is allowed to switch their UID. On a system
|
| /linux/tools/perf/trace/beauty/ |
| H A D | statx.c | |
| /linux/tools/testing/selftests/drivers/usb/usbip/ |
| H A D | usbip_test.sh | 35 if [ $UID != 0 ]; then
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-idmapper.rst | 41 uid: Find the UID for the given user 43 user: Find the user name for the given UID
|
| /linux/tools/testing/selftests/cpufreq/ |
| H A D | main.sh | 44 if [ $UID != 0 ]; then
|
| /linux/tools/testing/selftests/intel_pstate/ |
| H A D | run.sh | 42 if [ $UID != 0 ] && [ $EVALUATE_ONLY == 0 ]; then
|
| /linux/tools/testing/selftests/cpu-hotplug/ |
| H A D | cpu-on-off-test.sh | 13 if [ $UID != 0 ]; then
|
| /linux/Documentation/driver-api/cxl/platform/acpi/ |
| H A D | cedt.rst | 13 device register information, it reports the specific host bridge UID for this
|
| /linux/include/linux/ceph/ |
| H A D | ceph_features.h | 76 DEFINE_CEPH_FEATURE( 0, 1, UID)
|