Home
last modified time | relevance | path

Searched refs:GID (Results 1 – 25 of 36) sorted by relevance

12

/linux-6.6.21/security/safesetid/
Dlsm.c46 } else if (policy->type == GID) { in _setid_policy_lookup()
74 else if (new_type == GID) in setid_policy_lookup()
127 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable()
156 } else if (new_type == GID){ in id_permitted_for_cred()
175 } else if (new_type == GID) { in id_permitted_for_cred()
220 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid()
223 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) && in safesetid_task_fix_setgid()
224 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) && in safesetid_task_fix_setgid()
225 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) && in safesetid_task_fix_setgid()
226 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID)) in safesetid_task_fix_setgid()
[all …]
Dsecurityfs.c58 } else if (rule->type == GID){ in parse_policy_line()
92 else if (pol->type == GID) in insert_rule()
110 } else if (pol->type == GID) { in verify_ruleset()
131 nrule->type = GID; in verify_ruleset()
216 } else if (policy_type == GID) { in handle_policy_update()
260 return handle_policy_update(file, buf, len, GID); in safesetid_gid_file_write()
DKconfig9 restrict UID/GID transitions from a given UID/GID to only those
Dlsm.h37 GID enumerator
/linux-6.6.21/Documentation/admin-guide/LSM/
DSafeSetID.rst5 UID/GID transitions from a given UID/GID to only those approved by a
8 allowing a user to set up user namespace UID/GID mappings.
57 to do process spawning and UID/GID transitions). Unfortunately, there are a
70 programs in the tree could change to any desired UID/GID in the context of their
103 mounted. The format for adding a policy is '<UID>:<UID>' or '<GID>:<GID>',
106 for a UID/GID will prevent that UID/GID from obtaining auxiliary setid
107 privileges, such as allowing a user to set up user namespace UID/GID mappings.
109 Note on GID policies and setgroups()
115 support in a future release for restricting setgroups() calls, these GID
117 once we have the policy checking code in place, which will rely on GID policy
/linux-6.6.21/Documentation/admin-guide/
Dhighuid.rst18 maximum UID/GID. They are limited by the maximum file size on the
27 (currently, the old 16-bit UID and GID are still written to disk, and
29 GID)
/linux-6.6.21/Documentation/ABI/stable/
Dsysfs-driver-ib_srp18 destination GID.
118 Description: InfiniBand destination GID used for communication with the SRP
153 Description: InfiniBand destination GID specified in the parameters
182 Description: InfiniBand GID of the source port used for communication with
Dsysfs-class-infiniband223 Description: The net-device's name associated with the GID resides
230 Description: The RoCE type of the associated GID resides at index <gid-index>.
345 entry in the port's P_Key or GID table respectively. For
361 <m>/gid_idx/0: (RO) Display the GID mapping m = 1..2
/linux-6.6.21/tools/perf/trace/beauty/
Dstatx.c60 P_FLAG(GID); in syscall_arg__scnprintf_statx_mask()
/linux-6.6.21/Documentation/admin-guide/nfs/
Dnfs-idmapper.rst42 gid: Find the GID for the given group
44 group: Find the group name for the given GID
/linux-6.6.21/drivers/net/ethernet/renesas/
Dravb_ptp.c199 ravb_write(ndev, GID_PTCD, GID); in ravb_ptp_extts()
265 ravb_write(ndev, GID_PTMD0, GID); in ravb_ptp_perout()
Dravb.h174 GID = 0x03D0, /* R-Car Gen3 only */ enumerator
/linux-6.6.21/Documentation/security/
Dcredentials.rst45 defined by the UID and the GID marked on the inode.
72 from the real UID and GID that normally form the objective context of the
132 The UID and GID are carried by most, if not all, Linux objects, even if in
142 EUID/EGID/GROUPS will be used as the subjective context, and real UID/GID
234 * UNIX UID, GID, mode;
320 gid_t current_gid(void) Current's real GID
322 gid_t current_egid(void) Current's effective GID
324 gid_t current_fsgid(void) Current's file access GID
DIMA-templates.rst15 the inode UID/GID or the LSM labels either of the inode and of the process
80 - 'igid': the inode GID;
/linux-6.6.21/Documentation/admin-guide/perf/
Dcxl.rst64 $# perf stat -a -e cxl_pmu_mem0.0/vid=VID,gid=GID,mask=MASK/
/linux-6.6.21/Documentation/filesystems/ext4/
Dinodes.rst79 - Lower 16-bits of GID.
206 - S_ISGID (Set GID)
395 - Upper 16-bits of the GID.
430 - Upper 16-bits of the GID.
/linux-6.6.21/Documentation/filesystems/
Dquota.rst48 - UID/GID (depends on quota type) of user / group whose limit
Dhpfs.rst84 attributes with keys "UID", "GID" or "MODE" and 2-byte values are created. Only
95 that if somebody (I don't know who?) has set "UID", "GID", "MODE" or "DEV"
/linux-6.6.21/drivers/infiniband/
DKconfig74 This allows the user to config the default GID type that the CM
/linux-6.6.21/Documentation/security/keys/
Drequest-key.rst108 UID, GID, groups and security info of process A as if it was process A,
129 of them, and (b) it requires the same UID/GID/Groups all the way through.
/linux-6.6.21/Documentation/filesystems/nfs/
Drpc-cache.rst25 - mappings between local UID/GID and remote UID/GID for sites that
/linux-6.6.21/security/keys/
DKconfig19 to five standard keyrings: UID-specific, GID-specific, session,
/linux-6.6.21/Documentation/ABI/testing/
Dsysfs-class-rnbd-client43 gid:<GID>
/linux-6.6.21/Documentation/admin-guide/sysctl/
Dfs.rst142 with writes enabled, any UID or GID that would exceed 65535 is translated
145 These sysctls allow you to change the value of the fixed UID and GID.
/linux-6.6.21/usr/
DKconfig50 If INITRAMFS_SOURCE points to a directory, files owned by this GID

12