Home
last modified time | relevance | path

Searched refs:uid (Results 276 - 300 of 1634) sorted by relevance

1...<<11121314151617181920>>...66

/kernel/linux/linux-5.10/kernel/
H A Duid16.h5 long __sys_setuid(uid_t uid);
11 long __sys_setfsuid(uid_t uid);
H A Dauditsc.c335 static int audit_compare_uid(kuid_t uid, in audit_compare_uid() argument
344 rc = audit_uid_comparator(uid, f->op, name->uid); in audit_compare_uid()
351 rc = audit_uid_comparator(uid, f->op, n->uid); in audit_compare_uid()
392 return audit_compare_uid(cred->uid, name, f, ctx); in audit_field_compare()
409 /* uid comparisons */ in audit_field_compare()
411 return audit_uid_comparator(cred->uid, f->op, in audit_field_compare()
414 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare()
416 return audit_uid_comparator(cred->uid, in audit_field_compare()
984 audit_log_pid_context(struct audit_context *context, pid_t pid, kuid_t auid, kuid_t uid, unsigned int sessionid, u32 sid, char *comm) audit_log_pid_context() argument
2389 __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode) __audit_ipc_set_perm() argument
2661 kuid_t auid, uid; audit_log_task() local
[all...]
/kernel/linux/linux-6.6/kernel/
H A Duid16.h5 long __sys_setuid(uid_t uid);
11 long __sys_setfsuid(uid_t uid);
H A Dauditsc.c332 static int audit_compare_uid(kuid_t uid, in audit_compare_uid() argument
341 rc = audit_uid_comparator(uid, f->op, name->uid); in audit_compare_uid()
348 rc = audit_uid_comparator(uid, f->op, n->uid); in audit_compare_uid()
389 return audit_compare_uid(cred->uid, name, f, ctx); in audit_field_compare()
406 /* uid comparisons */ in audit_field_compare()
408 return audit_uid_comparator(cred->uid, f->op, in audit_field_compare()
411 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare()
413 return audit_uid_comparator(cred->uid, in audit_field_compare()
1093 audit_log_pid_context(struct audit_context *context, pid_t pid, kuid_t auid, kuid_t uid, unsigned int sessionid, u32 sid, char *comm) audit_log_pid_context() argument
2648 __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode) __audit_ipc_set_perm() argument
2946 kuid_t auid, uid; audit_log_task() local
[all...]
/third_party/eudev/src/shared/
H A Dmkdir-label.c33 int mkdir_safe_label(const char *path, mode_t mode, uid_t uid, gid_t gid) { in mkdir_safe_label() argument
34 return mkdir_safe_internal(path, mode, uid, gid, mkdir_label); in mkdir_safe_label()
/third_party/musl/libc-test/src/functionalext/supplement/unistd/
H A Dgetuid.c33 uid_t uid = getuid(); in getuid_0100() local
35 EXPECT_EQ("getuid_0100", uid, intuid); in getuid_0100()
/kernel/linux/linux-5.10/drivers/base/
H A Ddevtmpfs.c44 kuid_t uid; member
126 req.uid = GLOBAL_ROOT_UID; in devtmpfs_create_node()
128 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp); in devtmpfs_create_node()
207 static int handle_create(const char *nodename, umode_t mode, kuid_t uid, in handle_create() argument
227 newattrs.ia_uid = uid; in handle_create()
380 static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid, in handle() argument
384 return handle_create(name, mode, uid, gid, dev); in handle()
400 req->uid, req->gid, req->dev); in devtmpfs_work_loop()
/kernel/linux/linux-6.6/drivers/base/
H A Ddevtmpfs.c52 kuid_t uid; member
123 req.uid = GLOBAL_ROOT_UID; in devtmpfs_create_node()
125 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp); in devtmpfs_create_node()
204 static int handle_create(const char *nodename, umode_t mode, kuid_t uid, in handle_create() argument
225 newattrs.ia_uid = uid; in handle_create()
380 static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid, in handle() argument
384 return handle_create(name, mode, uid, gid, dev); in handle()
400 req->uid, req->gid, req->dev); in devtmpfs_work_loop()
/kernel/linux/linux-6.6/tools/testing/selftests/safesetid/
H A Dsafesetid-test.c107 static void ensure_user_exists(uid_t uid) in ensure_user_exists() argument
114 if (getpwuid(uid) == NULL) { in ensure_user_exists()
121 snprintf(name_str, 10, "user %d", uid); in ensure_user_exists()
123 p.pw_uid=uid; in ensure_user_exists()
124 p.pw_gid=uid; in ensure_user_exists()
234 uid_t uid; in test_userns() local
240 uid = getuid(); in test_userns()
258 success = write_file(map_file_name, "0 %d 1", uid); in test_userns()
493 die("Error with set uid(%d)\n", NO_POLICY_UGID); in main()
508 die("Error with set uid( in main()
[all...]
/third_party/node/src/
H A Dnode_credentials.cc160 static char* name_by_uid(uid_t uid) { in name_by_uid() argument
169 if ((rc = getpwuid_r(uid, &pwd, buf, sizeof(buf), &pp)) == 0 && in name_by_uid()
308 uid_t uid = uid_by_name(env->isolate(), args[0]); in SetUid() local
310 if (uid == uid_not_found) { in SetUid()
313 } else if (setuid(uid)) { in SetUid()
327 uid_t uid = uid_by_name(env->isolate(), args[0]); in SetEUid() local
329 if (uid == uid_not_found) { in SetEUid()
332 } else if (seteuid(uid)) { in SetEUid()
/kernel/linux/linux-5.10/block/
H A Dsed-opal.c1026 static int cmd_start(struct opal_dev *dev, const u8 *uid, const u8 *method) in cmd_start() argument
1034 add_token_bytestring(&err, dev, uid, OPAL_UID_LENGTH); in cmd_start()
1147 u8 uid[OPAL_UID_LENGTH]; in generic_get_table_info() local
1156 memcpy(uid, opaluid[OPAL_TABLE_TABLE], half); in generic_get_table_info()
1157 memcpy(uid + half, table_uid, half); in generic_get_table_info()
1159 return generic_get_column(dev, uid, column); in generic_get_table_info()
1164 u8 uid[OPAL_UID_LENGTH]; in gen_key() local
1167 memcpy(uid, dev->prev_data, min(sizeof(uid), dev->prev_d_len)); in gen_key()
1171 err = cmd_start(dev, uid, opalmetho in gen_key()
1211 u8 uid[OPAL_UID_LENGTH]; get_active_key() local
1226 generic_table_write_data(struct opal_dev *dev, const u64 data, u64 offset, u64 size, const u8 *uid) generic_table_write_data() argument
1295 generic_lr_enable_disable(struct opal_dev *dev, u8 *uid, bool rle, bool wle, bool rl, bool wl) generic_lr_enable_disable() argument
1333 enable_global_lr(struct opal_dev *dev, u8 *uid, struct opal_user_lr_setup *setup) enable_global_lr() argument
1348 u8 uid[OPAL_UID_LENGTH]; setup_locking_range() local
1558 u8 uid[OPAL_UID_LENGTH]; internal_activate_user() local
1586 u8 uid[OPAL_UID_LENGTH]; erase_locking_range() local
[all...]
/kernel/linux/linux-5.10/security/keys/
H A Dkeyctl.c639 * type;uid;gid;perm;description<NUL>
683 from_kuid_munged(current_user_ns(), key->uid), in keyctl_describe_key()
940 * caller must have sysadmin capability. If either uid or gid is -1 then that
955 kuid_t uid; in keyctl_chown_key() local
958 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key()
961 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key()
987 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key()
1000 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key()
[all...]
/kernel/linux/linux-6.6/security/keys/
H A Dkeyctl.c639 * type;uid;gid;perm;description<NUL>
683 from_kuid_munged(current_user_ns(), key->uid), in keyctl_describe_key()
940 * caller must have sysadmin capability. If either uid or gid is -1 then that
955 kuid_t uid; in keyctl_chown_key() local
958 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key()
961 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key()
987 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key()
1000 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key()
[all...]
/kernel/linux/linux-5.10/drivers/infiniband/hw/mlx5/
H A Ddevx.h28 void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid);
36 static inline void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid) {} in mlx5_ib_devx_destroy() argument
/kernel/linux/linux-5.10/security/safesetid/
H A Dlsm.h31 kuid_t uid; member
56 #define INVALID_ID (kid_t){.uid = INVALID_UID}
/kernel/linux/linux-5.10/tools/testing/selftests/android/ion/
H A Dion_test.sh28 uid=$(id -u)
29 if [ $uid -ne 0 ]; then
/kernel/linux/linux-6.6/fs/sysfs/
H A Dsysfs.h31 const struct attribute *attr, umode_t amode, kuid_t uid,
35 kuid_t uid, kgid_t gid, const void *ns);
/kernel/linux/linux-6.6/drivers/infiniband/hw/mlx5/
H A Ddevx.h28 void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid);
36 static inline void mlx5_ib_devx_destroy(struct mlx5_ib_dev *dev, u16 uid) {} in mlx5_ib_devx_destroy() argument
/kernel/linux/linux-6.6/tools/testing/selftests/mm/
H A Dtest_hmm.sh23 uid=$(id -u)
24 if [ $uid -ne 0 ]; then
/kernel/linux/linux-6.6/security/safesetid/
H A Dlsm.h31 kuid_t uid; member
56 #define INVALID_ID (kid_t){.uid = INVALID_UID}
/third_party/musl/src/passwd/
H A Dgetpwent.c25 struct passwd *getpwuid(uid_t uid) in getpwuid() argument
28 __getpw_a(0, uid, &pw, &line, &size, &res); in getpwuid()
/third_party/ltp/testcases/kernel/syscalls/ioctl/
H A Dioctl_ns03.c35 uid_t uid; in run() local
37 owner_fd = ioctl(fd, NS_GET_OWNER_UID, &uid); in run()
/third_party/node/deps/undici/src/lib/websocket/
H A Dconstants.js7 const uid = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'
44 uid,
/kernel/linux/linux-5.10/security/
H A Dcommoncap.c33 * bit is left on either to change the uid (plausible) or
413 /* If the root kuid maps to a valid uid in current ns, then return in cap_inode_getsecurity()
646 * or the more limited uid specified in the xattr. in get_vfs_caps_from_disk()
714 static inline bool __is_real(kuid_t uid, struct cred *cred) in __is_real() argument
715 { return uid_eq(cred->uid, uid); } in __is_real()
717 static inline bool __is_eff(kuid_t uid, struct cred *cred) in __is_eff() argument
718 { return uid_eq(cred->euid, uid); } in __is_eff()
720 static inline bool __is_suid(kuid_t uid, struct cred *cred) in __is_suid() argument
721 { return !__is_real(uid, cre in __is_suid()
[all...]
/kernel/linux/linux-6.6/security/
H A Dcommoncap.c34 * bit is left on either to change the uid (plausible) or
425 /* If the root kuid maps to a valid uid in current ns, then return in cap_inode_getsecurity()
487 * rootid_from_xattr - translate root uid of vfs caps
693 * or the more limited uid specified in the xattr. in get_vfs_caps_from_disk()
767 static inline bool __is_real(kuid_t uid, struct cred *cred) in __is_real() argument
768 { return uid_eq(cred->uid, uid); } in __is_real()
770 static inline bool __is_eff(kuid_t uid, struct cred *cred) in __is_eff() argument
771 { return uid_eq(cred->euid, uid); } in __is_eff()
773 static inline bool __is_suid(kuid_t uid, struc argument
[all...]

Completed in 24 milliseconds

1...<<11121314151617181920>>...66