Lines Matching refs:uid
39 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src.uid)) {
40 if (!uid_eq(rule->src_id.uid, src.uid))
42 if (uid_eq(rule->dst_id.uid, dst.uid))
119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT)
123 * set*uid() (e.g. setting up userns uid mappings).
125 pr_warn("Operation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*uid transitions\n",
126 __kuid_val(cred->uid));
141 __kuid_val(cred->uid));
162 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) ||
163 uid_eq(new_id.uid, old->suid))
177 setid_policy_lookup((kid_t){.uid = old->uid}, new_id, new_type) != SIDPOL_CONSTRAINED;
182 __kuid_val(old->uid), __kuid_val(old->euid),
183 __kuid_val(old->suid), __kuid_val(new_id.uid));
196 * set*uid to user under new cred struct, or the UID transition is allowed (by
197 * Linux set*uid rules) even without CAP_SETUID.
205 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT)
208 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) &&
209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) &&
210 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) &&
211 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID))