/kernel/linux/linux-5.10/kernel/ |
H A D | uid16.h | 5 long __sys_setuid(uid_t uid); 11 long __sys_setfsuid(uid_t uid);
|
H A D | auditsc.c | 335 static int audit_compare_uid(kuid_t uid, in audit_compare_uid() argument 344 rc = audit_uid_comparator(uid, f->op, name->uid); in audit_compare_uid() 351 rc = audit_uid_comparator(uid, f->op, n->uid); in audit_compare_uid() 392 return audit_compare_uid(cred->uid, name, f, ctx); in audit_field_compare() 409 /* uid comparisons */ in audit_field_compare() 411 return audit_uid_comparator(cred->uid, f->op, in audit_field_compare() 414 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare() 416 return audit_uid_comparator(cred->uid, in audit_field_compare() 984 audit_log_pid_context(struct audit_context *context, pid_t pid, kuid_t auid, kuid_t uid, unsigned int sessionid, u32 sid, char *comm) audit_log_pid_context() argument 2389 __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode) __audit_ipc_set_perm() argument 2661 kuid_t auid, uid; audit_log_task() local [all...] |
/kernel/linux/linux-6.6/kernel/ |
H A D | uid16.h | 5 long __sys_setuid(uid_t uid); 11 long __sys_setfsuid(uid_t uid);
|
H A D | auditsc.c | 332 static int audit_compare_uid(kuid_t uid, in audit_compare_uid() argument 341 rc = audit_uid_comparator(uid, f->op, name->uid); in audit_compare_uid() 348 rc = audit_uid_comparator(uid, f->op, n->uid); in audit_compare_uid() 389 return audit_compare_uid(cred->uid, name, f, ctx); in audit_field_compare() 406 /* uid comparisons */ in audit_field_compare() 408 return audit_uid_comparator(cred->uid, f->op, in audit_field_compare() 411 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare() 413 return audit_uid_comparator(cred->uid, in audit_field_compare() 1093 audit_log_pid_context(struct audit_context *context, pid_t pid, kuid_t auid, kuid_t uid, unsigned int sessionid, u32 sid, char *comm) audit_log_pid_context() argument 2648 __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode) __audit_ipc_set_perm() argument 2946 kuid_t auid, uid; audit_log_task() local [all...] |
/third_party/eudev/src/shared/ |
H A D | mkdir-label.c | 33 int mkdir_safe_label(const char *path, mode_t mode, uid_t uid, gid_t gid) { in mkdir_safe_label() argument 34 return mkdir_safe_internal(path, mode, uid, gid, mkdir_label); in mkdir_safe_label()
|
/third_party/musl/libc-test/src/functionalext/supplement/unistd/ |
H A D | getuid.c | 33 uid_t uid = getuid(); in getuid_0100() local 35 EXPECT_EQ("getuid_0100", uid, intuid); in getuid_0100()
|
/kernel/linux/linux-5.10/drivers/base/ |
H A D | devtmpfs.c | 44 kuid_t uid; member 126 req.uid = GLOBAL_ROOT_UID; in devtmpfs_create_node() 128 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp); in devtmpfs_create_node() 207 static int handle_create(const char *nodename, umode_t mode, kuid_t uid, in handle_create() argument 227 newattrs.ia_uid = uid; in handle_create() 380 static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid, in handle() argument 384 return handle_create(name, mode, uid, gid, dev); in handle() 400 req->uid, req->gid, req->dev); in devtmpfs_work_loop()
|
/kernel/linux/linux-6.6/drivers/base/ |
H A D | devtmpfs.c | 52 kuid_t uid; member 123 req.uid = GLOBAL_ROOT_UID; in devtmpfs_create_node() 125 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp); in devtmpfs_create_node() 204 static int handle_create(const char *nodename, umode_t mode, kuid_t uid, in handle_create() argument 225 newattrs.ia_uid = uid; in handle_create() 380 static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid, in handle() argument 384 return handle_create(name, mode, uid, gid, dev); in handle() 400 req->uid, req->gid, req->dev); in devtmpfs_work_loop()
|
/kernel/linux/linux-6.6/tools/testing/selftests/safesetid/ |
H A D | safesetid-test.c | 107 static void ensure_user_exists(uid_t uid) in ensure_user_exists() argument 114 if (getpwuid(uid) == NULL) { in ensure_user_exists() 121 snprintf(name_str, 10, "user %d", uid); in ensure_user_exists() 123 p.pw_uid=uid; in ensure_user_exists() 124 p.pw_gid=uid; in ensure_user_exists() 234 uid_t uid; in test_userns() local 240 uid = getuid(); in test_userns() 258 success = write_file(map_file_name, "0 %d 1", uid); in test_userns() 493 die("Error with set uid(%d)\n", NO_POLICY_UGID); in main() 508 die("Error with set uid( in main() [all...] |
/third_party/node/src/ |
H A D | node_credentials.cc | 160 static char* name_by_uid(uid_t uid) { in name_by_uid() argument 169 if ((rc = getpwuid_r(uid, &pwd, buf, sizeof(buf), &pp)) == 0 && in name_by_uid() 308 uid_t uid = uid_by_name(env->isolate(), args[0]); in SetUid() local 310 if (uid == uid_not_found) { in SetUid() 313 } else if (setuid(uid)) { in SetUid() 327 uid_t uid = uid_by_name(env->isolate(), args[0]); in SetEUid() local 329 if (uid == uid_not_found) { in SetEUid() 332 } else if (seteuid(uid)) { in SetEUid()
|
/kernel/linux/linux-5.10/block/ |
H A D | sed-opal.c | 1026 static int cmd_start(struct opal_dev *dev, const u8 *uid, const u8 *method) in cmd_start() argument 1034 add_token_bytestring(&err, dev, uid, OPAL_UID_LENGTH); in cmd_start() 1147 u8 uid[OPAL_UID_LENGTH]; in generic_get_table_info() local 1156 memcpy(uid, opaluid[OPAL_TABLE_TABLE], half); in generic_get_table_info() 1157 memcpy(uid + half, table_uid, half); in generic_get_table_info() 1159 return generic_get_column(dev, uid, column); in generic_get_table_info() 1164 u8 uid[OPAL_UID_LENGTH]; in gen_key() local 1167 memcpy(uid, dev->prev_data, min(sizeof(uid), dev->prev_d_len)); in gen_key() 1171 err = cmd_start(dev, uid, opalmetho in gen_key() 1211 u8 uid[OPAL_UID_LENGTH]; get_active_key() local 1226 generic_table_write_data(struct opal_dev *dev, const u64 data, u64 offset, u64 size, const u8 *uid) generic_table_write_data() argument 1295 generic_lr_enable_disable(struct opal_dev *dev, u8 *uid, bool rle, bool wle, bool rl, bool wl) generic_lr_enable_disable() argument 1333 enable_global_lr(struct opal_dev *dev, u8 *uid, struct opal_user_lr_setup *setup) enable_global_lr() argument 1348 u8 uid[OPAL_UID_LENGTH]; setup_locking_range() local 1558 u8 uid[OPAL_UID_LENGTH]; internal_activate_user() local 1586 u8 uid[OPAL_UID_LENGTH]; erase_locking_range() local [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | keyctl.c | 639 * type;uid;gid;perm;description<NUL> 683 from_kuid_munged(current_user_ns(), key->uid), in keyctl_describe_key() 940 * caller must have sysadmin capability. If either uid or gid is -1 then that 955 kuid_t uid; in keyctl_chown_key() local 958 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key() 961 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key() 987 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key() 1000 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key() [all...] |
/kernel/linux/linux-6.6/security/keys/ |
H A D | keyctl.c | 639 * type;uid;gid;perm;description<NUL> 683 from_kuid_munged(current_user_ns(), key->uid), in keyctl_describe_key() 940 * caller must have sysadmin capability. If either uid or gid is -1 then that 955 kuid_t uid; in keyctl_chown_key() local 958 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key() 961 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key() 987 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key() 1000 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key() [all...] |
/kernel/linux/linux-5.10/drivers/infiniband/hw/mlx5/ |
H A D | devx.h | 28 void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid); 36 static inline void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid) {} in mlx5_ib_devx_destroy() argument
|
/kernel/linux/linux-5.10/security/safesetid/ |
H A D | lsm.h | 31 kuid_t uid; member 56 #define INVALID_ID (kid_t){.uid = INVALID_UID}
|
/kernel/linux/linux-5.10/tools/testing/selftests/android/ion/ |
H A D | ion_test.sh | 28 uid=$(id -u) 29 if [ $uid -ne 0 ]; then
|
/kernel/linux/linux-6.6/fs/sysfs/ |
H A D | sysfs.h | 31 const struct attribute *attr, umode_t amode, kuid_t uid, 35 kuid_t uid, kgid_t gid, const void *ns);
|
/kernel/linux/linux-6.6/drivers/infiniband/hw/mlx5/ |
H A D | devx.h | 28 void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid); 36 static inline void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid) {} in mlx5_ib_devx_destroy() argument
|
/kernel/linux/linux-6.6/tools/testing/selftests/mm/ |
H A D | test_hmm.sh | 23 uid=$(id -u) 24 if [ $uid -ne 0 ]; then
|
/kernel/linux/linux-6.6/security/safesetid/ |
H A D | lsm.h | 31 kuid_t uid; member 56 #define INVALID_ID (kid_t){.uid = INVALID_UID}
|
/third_party/musl/src/passwd/ |
H A D | getpwent.c | 25 struct passwd *getpwuid(uid_t uid) in getpwuid() argument 28 __getpw_a(0, uid, &pw, &line, &size, &res); in getpwuid()
|
/third_party/ltp/testcases/kernel/syscalls/ioctl/ |
H A D | ioctl_ns03.c | 35 uid_t uid; in run() local 37 owner_fd = ioctl(fd, NS_GET_OWNER_UID, &uid); in run()
|
/third_party/node/deps/undici/src/lib/websocket/ |
H A D | constants.js | 7 const uid = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11' 44 uid,
|
/kernel/linux/linux-5.10/security/ |
H A D | commoncap.c | 33 * bit is left on either to change the uid (plausible) or 413 /* If the root kuid maps to a valid uid in current ns, then return in cap_inode_getsecurity() 646 * or the more limited uid specified in the xattr. in get_vfs_caps_from_disk() 714 static inline bool __is_real(kuid_t uid, struct cred *cred) in __is_real() argument 715 { return uid_eq(cred->uid, uid); } in __is_real() 717 static inline bool __is_eff(kuid_t uid, struct cred *cred) in __is_eff() argument 718 { return uid_eq(cred->euid, uid); } in __is_eff() 720 static inline bool __is_suid(kuid_t uid, struct cred *cred) in __is_suid() argument 721 { return !__is_real(uid, cre in __is_suid() [all...] |
/kernel/linux/linux-6.6/security/ |
H A D | commoncap.c | 34 * bit is left on either to change the uid (plausible) or 425 /* If the root kuid maps to a valid uid in current ns, then return in cap_inode_getsecurity() 487 * rootid_from_xattr - translate root uid of vfs caps 693 * or the more limited uid specified in the xattr. in get_vfs_caps_from_disk() 767 static inline bool __is_real(kuid_t uid, struct cred *cred) in __is_real() argument 768 { return uid_eq(cred->uid, uid); } in __is_real() 770 static inline bool __is_eff(kuid_t uid, struct cred *cred) in __is_eff() argument 771 { return uid_eq(cred->euid, uid); } in __is_eff() 773 static inline bool __is_suid(kuid_t uid, struc argument [all...] |