| /kernel/linux/linux-5.10/include/linux/ |
| D | highuid.h | 26 * This is the "overflow" UID and GID. They are used to signify uid/gid 27 * overflow to old programs when they request uid/gid information but are 30 * processes are owned by this uid/gid. 46 /* prevent uid mod 65536 effect by returning a default value for high UIDs */ 47 #define high2lowuid(uid) ((uid) & ~0xFFFF ? (old_uid_t)overflowuid : (old_uid_t)(uid)) argument 53 #define low2highuid(uid) ((uid) == (old_uid_t)-1 ? (uid_t)-1 : (uid_t)(uid)) argument 56 #define __convert_uid(size, uid) \ argument 57 (size >= sizeof(uid) ? (uid) : high2lowuid(uid)) 64 #define __convert_uid(size, uid) (uid) argument 69 /* uid/gid input should be always 32bit uid_t */ [all …]
|
| D | uidgid.h | 9 * the kernel are values used by userspace and which uid and gid values are 34 static inline uid_t __kuid_val(kuid_t uid) in __kuid_val() argument 36 return uid.val; in __kuid_val() 44 static inline uid_t __kuid_val(kuid_t uid) in __kuid_val() argument 119 static inline bool uid_valid(kuid_t uid) in uid_valid() argument 121 return __kuid_val(uid) != (uid_t) -1; in uid_valid() 131 extern kuid_t make_kuid(struct user_namespace *from, uid_t uid); 134 extern uid_t from_kuid(struct user_namespace *to, kuid_t uid); 136 extern uid_t from_kuid_munged(struct user_namespace *to, kuid_t uid); 139 static inline bool kuid_has_mapping(struct user_namespace *ns, kuid_t uid) in kuid_has_mapping() argument [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | highuid.h | 26 * This is the "overflow" UID and GID. They are used to signify uid/gid 27 * overflow to old programs when they request uid/gid information but are 30 * processes are owned by this uid/gid. 46 /* prevent uid mod 65536 effect by returning a default value for high UIDs */ 47 #define high2lowuid(uid) ((uid) & ~0xFFFF ? (old_uid_t)overflowuid : (old_uid_t)(uid)) argument 53 #define low2highuid(uid) ((uid) == (old_uid_t)-1 ? (uid_t)-1 : (uid_t)(uid)) argument 56 #define __convert_uid(size, uid) \ argument 57 (size >= sizeof(uid) ? (uid) : high2lowuid(uid)) 64 #define __convert_uid(size, uid) (uid) argument 69 /* uid/gid input should be always 32bit uid_t */ [all …]
|
| D | uidgid.h | 9 * the kernel are values used by userspace and which uid and gid values are 34 static inline uid_t __kuid_val(kuid_t uid) in __kuid_val() argument 36 return uid.val; in __kuid_val() 44 static inline uid_t __kuid_val(kuid_t uid) in __kuid_val() argument 119 static inline bool uid_valid(kuid_t uid) in uid_valid() argument 121 return __kuid_val(uid) != (uid_t) -1; in uid_valid() 131 extern kuid_t make_kuid(struct user_namespace *from, uid_t uid); 134 extern uid_t from_kuid(struct user_namespace *to, kuid_t uid); 136 extern uid_t from_kuid_munged(struct user_namespace *to, kuid_t uid); 139 static inline bool kuid_has_mapping(struct user_namespace *ns, kuid_t uid) in kuid_has_mapping() argument [all …]
|
| /kernel/linux/linux-5.10/security/safesetid/ |
| D | lsm.c | 38 if (policy->type == UID) { in _setid_policy_lookup() 39 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src.uid)) { in _setid_policy_lookup() 40 if (!uid_eq(rule->src_id.uid, src.uid)) in _setid_policy_lookup() 42 if (uid_eq(rule->dst_id.uid, dst.uid)) in _setid_policy_lookup() 72 if (new_type == UID) in setid_policy_lookup() 119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 123 * set*uid() (e.g. setting up userns uid mappings). in safesetid_security_capable() 125 …ation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*ui… in safesetid_security_capable() 126 __kuid_val(cred->uid)); in safesetid_security_capable() 141 __kuid_val(cred->uid)); in safesetid_security_capable() [all …]
|
| D | securityfs.c | 38 /* Format of |buf| string should be <UID>:<UID> or <GID>:<GID> */ in parse_policy_line() 53 if (rule->type == UID){ in parse_policy_line() 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 56 if (!uid_valid(rule->src_id.uid) || !uid_valid(rule->dst_id.uid)) in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 91 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_id.uid)); in insert_rule() 94 else /* Error, pol->type is neither UID or GID */ in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 107 …pr_warn("insecure policy detected: uid %d is constrained but transitively unconstrained through ui… in verify_ruleset() [all …]
|
| /kernel/linux/linux-6.6/drivers/infiniband/hw/mlx5/ |
| D | cmd.c | 57 void mlx5_cmd_destroy_tir(struct mlx5_core_dev *dev, u32 tirn, u16 uid) in mlx5_cmd_destroy_tir() argument 63 MLX5_SET(destroy_tir_in, in, uid, uid); in mlx5_cmd_destroy_tir() 67 void mlx5_cmd_destroy_tis(struct mlx5_core_dev *dev, u32 tisn, u16 uid) in mlx5_cmd_destroy_tis() argument 73 MLX5_SET(destroy_tis_in, in, uid, uid); in mlx5_cmd_destroy_tis() 77 int mlx5_cmd_destroy_rqt(struct mlx5_core_dev *dev, u32 rqtn, u16 uid) in mlx5_cmd_destroy_rqt() argument 83 MLX5_SET(destroy_rqt_in, in, uid, uid); in mlx5_cmd_destroy_rqt() 88 u16 uid) in mlx5_cmd_alloc_transport_domain() argument 96 MLX5_SET(alloc_transport_domain_in, in, uid, uid); in mlx5_cmd_alloc_transport_domain() 107 u16 uid) in mlx5_cmd_dealloc_transport_domain() argument 113 MLX5_SET(dealloc_transport_domain_in, in, uid, uid); in mlx5_cmd_dealloc_transport_domain() [all …]
|
| D | cmd.h | 43 int mlx5_cmd_dealloc_pd(struct mlx5_core_dev *dev, u32 pdn, u16 uid); 44 void mlx5_cmd_destroy_tir(struct mlx5_core_dev *dev, u32 tirn, u16 uid); 45 void mlx5_cmd_destroy_tis(struct mlx5_core_dev *dev, u32 tisn, u16 uid); 46 int mlx5_cmd_destroy_rqt(struct mlx5_core_dev *dev, u32 rqtn, u16 uid); 48 u16 uid); 50 u16 uid); 52 u32 qpn, u16 uid); 54 u32 qpn, u16 uid); 55 int mlx5_cmd_xrcd_alloc(struct mlx5_core_dev *dev, u32 *xrcdn, u16 uid); 56 int mlx5_cmd_xrcd_dealloc(struct mlx5_core_dev *dev, u32 xrcdn, u16 uid); [all …]
|
| D | qpc.c | 217 MLX5_SET(destroy_dct_in, in, uid, qp->uid); in _mlx5_core_destroy_dct() 235 qp->uid = MLX5_GET(create_dct_in, in, uid); in mlx5_core_create_dct() 259 qp->uid = MLX5_GET(create_qp_in, in, uid); in mlx5_qpc_create_qp() 273 MLX5_SET(destroy_qp_in, din, uid, qp->uid); in mlx5_qpc_create_qp() 286 MLX5_SET(drain_dct_in, in, uid, qp->uid); in mlx5_core_drain_dct() 330 MLX5_SET(destroy_qp_in, in, uid, qp->uid); in mlx5_core_destroy_qp() 403 struct mbox_info *mbox, u16 uid, u32 ece) in modify_qp_mbox_alloc() argument 415 MLX5_SET(typ##_in, in, uid, _uid); \ in modify_qp_mbox_alloc() 431 MOD_QP_IN_SET(qp_2rst, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() 436 MOD_QP_IN_SET(qp_2err, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() [all …]
|
| /kernel/linux/linux-5.10/net/core/ |
| D | lowpower_protocol.c | 31 uid_t uid; member 48 uid_t uid = foreground_uid_atomic_read(); in foreground_uid_show() local 50 seq_printf(seq, "%u\n", uid); in foreground_uid_show() 58 uid_t uid = simple_strtoul(p, &p, TO_DECIMAL); in foreground_uid_write() local 63 foreground_uid_atomic_set(uid); in foreground_uid_write() 74 seq_printf(seq, "uid list num: %u\n", g_dpa_uid_list_cnt); in dpa_uid_show() 76 seq_printf(seq, "%u\n", node->uid); in dpa_uid_show() 83 static int dpa_uid_add(uid_t uid); 84 static int dpa_uid_del(uid_t uid); 100 pr_err("[dpa-uid-cfg] fail to parse dpa uids\n"); in dpa_uid_write() [all …]
|
| /kernel/linux/linux-6.6/security/safesetid/ |
| D | lsm.c | 38 if (policy->type == UID) { in _setid_policy_lookup() 39 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src.uid)) { in _setid_policy_lookup() 40 if (!uid_eq(rule->src_id.uid, src.uid)) in _setid_policy_lookup() 42 if (uid_eq(rule->dst_id.uid, dst.uid)) in _setid_policy_lookup() 72 if (new_type == UID) in setid_policy_lookup() 113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 117 * set*uid() (e.g. setting up userns uid mappings). in safesetid_security_capable() 119 …ation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*ui… in safesetid_security_capable() 120 __kuid_val(cred->uid)); in safesetid_security_capable() 152 if (new_type == UID) { in id_permitted_for_cred() [all …]
|
| D | securityfs.c | 38 /* Format of |buf| string should be <UID>:<UID> or <GID>:<GID> */ in parse_policy_line() 53 if (rule->type == UID){ in parse_policy_line() 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 56 if (!uid_valid(rule->src_id.uid) || !uid_valid(rule->dst_id.uid)) in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 91 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_id.uid)); in insert_rule() 94 else /* Error, pol->type is neither UID or GID */ in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 107 …pr_warn("insecure policy detected: uid %d is constrained but transitively unconstrained through ui… in verify_ruleset() [all …]
|
| /kernel/linux/linux-6.6/drivers/platform/surface/aggregator/ |
| D | bus.c | 27 sdev->uid.domain, sdev->uid.category, sdev->uid.target, in modalias_show() 28 sdev->uid.instance, sdev->uid.function); in modalias_show() 43 sdev->uid.domain, sdev->uid.category, in ssam_device_uevent() 44 sdev->uid.target, sdev->uid.instance, in ssam_device_uevent() 45 sdev->uid.function); in ssam_device_uevent() 68 * @uid: The UID of the device to be added. 72 * UID. Note that the device still has to be added via ssam_device_add(). 79 struct ssam_device_uid uid) in ssam_device_alloc() argument 92 sdev->uid = uid; in ssam_device_alloc() 95 sdev->uid.domain, sdev->uid.category, sdev->uid.target, in ssam_device_alloc() [all …]
|
| /kernel/linux/linux-5.10/drivers/vdpa/mlx5/core/ |
| D | resources.c | 7 static int alloc_pd(struct mlx5_vdpa_dev *dev, u32 *pdn, u16 uid) in alloc_pd() argument 16 MLX5_SET(alloc_pd_in, in, uid, uid); in alloc_pd() 25 static int dealloc_pd(struct mlx5_vdpa_dev *dev, u32 pdn, u16 uid) in dealloc_pd() argument 32 MLX5_SET(dealloc_pd_in, in, uid, uid); in dealloc_pd() 50 static int create_uctx(struct mlx5_vdpa_dev *mvdev, u16 *uid) in create_uctx() argument 72 *uid = MLX5_GET(create_uctx_out, out, uid); in create_uctx() 77 static void destroy_uctx(struct mlx5_vdpa_dev *mvdev, u32 uid) in destroy_uctx() argument 83 MLX5_SET(destroy_uctx_in, in, uid, uid); in destroy_uctx() 94 MLX5_SET(create_tis_in, in, uid, mvdev->res.uid); in mlx5_vdpa_create_tis() 107 MLX5_SET(destroy_tis_in, in, uid, mvdev->res.uid); in mlx5_vdpa_destroy_tis() [all …]
|
| /kernel/linux/linux-6.6/drivers/vdpa/mlx5/core/ |
| D | resources.c | 8 static int alloc_pd(struct mlx5_vdpa_dev *dev, u32 *pdn, u16 uid) in alloc_pd() argument 17 MLX5_SET(alloc_pd_in, in, uid, uid); in alloc_pd() 26 static int dealloc_pd(struct mlx5_vdpa_dev *dev, u32 pdn, u16 uid) in dealloc_pd() argument 33 MLX5_SET(dealloc_pd_in, in, uid, uid); in dealloc_pd() 51 static int create_uctx(struct mlx5_vdpa_dev *mvdev, u16 *uid) in create_uctx() argument 76 *uid = MLX5_GET(create_uctx_out, out, uid); in create_uctx() 81 static void destroy_uctx(struct mlx5_vdpa_dev *mvdev, u32 uid) in destroy_uctx() argument 86 if (!uid) in destroy_uctx() 90 MLX5_SET(destroy_uctx_in, in, uid, uid); in destroy_uctx() 101 MLX5_SET(create_tis_in, in, uid, mvdev->res.uid); in mlx5_vdpa_create_tis() [all …]
|
| /kernel/linux/linux-5.10/drivers/infiniband/hw/mlx5/ |
| D | cmd.c | 151 void mlx5_cmd_destroy_tir(struct mlx5_core_dev *dev, u32 tirn, u16 uid) in mlx5_cmd_destroy_tir() argument 157 MLX5_SET(destroy_tir_in, in, uid, uid); in mlx5_cmd_destroy_tir() 161 void mlx5_cmd_destroy_tis(struct mlx5_core_dev *dev, u32 tisn, u16 uid) in mlx5_cmd_destroy_tis() argument 167 MLX5_SET(destroy_tis_in, in, uid, uid); in mlx5_cmd_destroy_tis() 171 int mlx5_cmd_destroy_rqt(struct mlx5_core_dev *dev, u32 rqtn, u16 uid) in mlx5_cmd_destroy_rqt() argument 177 MLX5_SET(destroy_rqt_in, in, uid, uid); in mlx5_cmd_destroy_rqt() 182 u16 uid) in mlx5_cmd_alloc_transport_domain() argument 190 MLX5_SET(alloc_transport_domain_in, in, uid, uid); in mlx5_cmd_alloc_transport_domain() 201 u16 uid) in mlx5_cmd_dealloc_transport_domain() argument 207 MLX5_SET(dealloc_transport_domain_in, in, uid, uid); in mlx5_cmd_dealloc_transport_domain() [all …]
|
| D | qpc.c | 209 MLX5_SET(destroy_dct_in, in, uid, qp->uid); in _mlx5_core_destroy_dct() 228 qp->uid = MLX5_GET(create_dct_in, in, uid); in mlx5_core_create_dct() 252 qp->uid = MLX5_GET(create_qp_in, in, uid); in mlx5_qpc_create_qp() 266 MLX5_SET(destroy_qp_in, din, uid, qp->uid); in mlx5_qpc_create_qp() 279 MLX5_SET(drain_dct_in, in, uid, qp->uid); in mlx5_core_drain_dct() 299 MLX5_SET(destroy_qp_in, in, uid, qp->uid); in mlx5_core_destroy_qp() 372 struct mbox_info *mbox, u16 uid, u32 ece) in modify_qp_mbox_alloc() argument 384 MLX5_SET(typ##_in, in, uid, _uid); \ in modify_qp_mbox_alloc() 400 MOD_QP_IN_SET(qp_2rst, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() 405 MOD_QP_IN_SET(qp_2err, mbox->in, opcode, qpn, uid); in modify_qp_mbox_alloc() [all …]
|
| /kernel/linux/linux-5.10/drivers/s390/block/ |
| D | dasd_alias.c | 53 static struct alias_server *_find_server(struct dasd_uid *uid) in _find_server() argument 57 if (!strncmp(pos->uid.vendor, uid->vendor, in _find_server() 58 sizeof(uid->vendor)) in _find_server() 59 && !strncmp(pos->uid.serial, uid->serial, in _find_server() 60 sizeof(uid->serial))) in _find_server() 67 struct dasd_uid *uid) in _find_lcu() argument 71 if (pos->uid.ssid == uid->ssid) in _find_lcu() 78 struct dasd_uid *uid) in _find_group() argument 93 if (uid->type == UA_BASE_DEVICE) in _find_group() 94 search_unit_addr = uid->real_unit_addr; in _find_group() [all …]
|
| /kernel/linux/linux-6.6/drivers/s390/block/ |
| D | dasd_alias.c | 53 static struct alias_server *_find_server(struct dasd_uid *uid) in _find_server() argument 57 if (!strncmp(pos->uid.vendor, uid->vendor, in _find_server() 58 sizeof(uid->vendor)) in _find_server() 59 && !strncmp(pos->uid.serial, uid->serial, in _find_server() 60 sizeof(uid->serial))) in _find_server() 67 struct dasd_uid *uid) in _find_lcu() argument 71 if (pos->uid.ssid == uid->ssid) in _find_lcu() 78 struct dasd_uid *uid) in _find_group() argument 93 if (uid->type == UA_BASE_DEVICE) in _find_group() 94 search_unit_addr = uid->real_unit_addr; in _find_group() [all …]
|
| /kernel/linux/linux-5.10/kernel/ |
| D | user.c | 74 * UID task count cache, to get fast user lookup in "alloc_uid" 81 #define __uidhashfn(uid) (((uid >> UIDHASH_BITS) + uid) & UIDHASH_MASK) argument 82 #define uidhashentry(uid) (uidhash_table + __uidhashfn((__kuid_val(uid)))) argument 104 .uid = GLOBAL_ROOT_UID, 121 static struct user_struct *uid_hash_find(kuid_t uid, struct hlist_head *hashent) in uid_hash_find() argument 126 if (uid_eq(user->uid, uid)) { in uid_hash_find() 148 * Locate the user_struct for the passed UID. If found, take a ref on it. The 153 struct user_struct *find_user(kuid_t uid) in find_user() argument 159 ret = uid_hash_find(uid, uidhashentry(uid)); in find_user() 175 struct user_struct *alloc_uid(kuid_t uid) in alloc_uid() argument [all …]
|
| /kernel/linux/linux-6.6/kernel/ |
| D | user.c | 74 * UID task count cache, to get fast user lookup in "alloc_uid" 81 #define __uidhashfn(uid) (((uid >> UIDHASH_BITS) + uid) & UIDHASH_MASK) argument 82 #define uidhashentry(uid) (uidhash_table + __uidhashfn((__kuid_val(uid)))) argument 101 .uid = GLOBAL_ROOT_UID, 118 static struct user_struct *uid_hash_find(kuid_t uid, struct hlist_head *hashent) in uid_hash_find() argument 123 if (uid_eq(user->uid, uid)) { in uid_hash_find() 162 * Locate the user_struct for the passed UID. If found, take a ref on it. The 167 struct user_struct *find_user(kuid_t uid) in find_user() argument 173 ret = uid_hash_find(uid, uidhashentry(uid)); in find_user() 190 struct user_struct *alloc_uid(kuid_t uid) in alloc_uid() argument [all …]
|
| /kernel/linux/linux-6.6/fs/9p/ |
| D | fid.c | 56 * @uid: return a fid belonging to the specified user 57 * @any: ignore uid as a selection criteria 61 kuid_t uid, bool any) in v9fs_fid_find_inode() argument 71 if (any || uid_eq(fid->uid, uid)) { in v9fs_fid_find_inode() 106 * v9fs_fid_find - retrieve a fid that belongs to the specified uid 108 * @uid: return fid that belongs to the specified user 113 static struct p9_fid *v9fs_fid_find(struct dentry *dentry, kuid_t uid, int any) in v9fs_fid_find() argument 117 p9_debug(P9_DEBUG_VFS, " dentry: %pd (%p) uid %d any %d\n", in v9fs_fid_find() 118 dentry, dentry, from_kuid(&init_user_ns, uid), in v9fs_fid_find() 127 if (any || uid_eq(fid->uid, uid)) { in v9fs_fid_find() [all …]
|
| /kernel/linux/linux-6.6/tools/crypto/ccp/ |
| D | dbc_cli.py | 46 choices=["get-nonce", "get-param", "set-param", "set-uid"], 53 parser.add_argument("--uid", help="File containing UID to pass") 68 uid = None variable 80 if args.uid: 81 if not os.path.exists(args.uid): 82 raise ValueError("Invalid uid file %s" % args.uid) 83 with open(args.uid, "rb") as f: 84 uid = f.read() variable 85 if len(uid) != DBC_UID_SIZE: 87 "Invalid UID length %d (expected %d)" % (len(uid), DBC_UID_SIZE) [all …]
|
| /kernel/linux/linux-6.6/security/keys/ |
| D | persistent.c | 2 /* General persistent per-UID keyrings register 40 static key_ref_t key_create_persistent(struct user_namespace *ns, kuid_t uid, in key_create_persistent() argument 58 uid, INVALID_GID, current_cred(), in key_create_persistent() 70 * Get the persistent keyring for a specific UID and link it to the nominated 73 static long key_get_persistent(struct user_namespace *ns, kuid_t uid, in key_get_persistent() argument 86 index_key.desc_len = sprintf(buf, "_persistent.%u", from_kuid(ns, uid)); in key_get_persistent() 103 persistent_ref = key_create_persistent(ns, uid, &index_key); in key_get_persistent() 126 * Get the persistent keyring for a specific UID and link it to the nominated 133 kuid_t uid; in keyctl_get_persistent() local 138 uid = current_uid(); in keyctl_get_persistent() [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | persistent.c | 2 /* General persistent per-UID keyrings register 40 static key_ref_t key_create_persistent(struct user_namespace *ns, kuid_t uid, in key_create_persistent() argument 58 uid, INVALID_GID, current_cred(), in key_create_persistent() 70 * Get the persistent keyring for a specific UID and link it to the nominated 73 static long key_get_persistent(struct user_namespace *ns, kuid_t uid, in key_get_persistent() argument 86 index_key.desc_len = sprintf(buf, "_persistent.%u", from_kuid(ns, uid)); in key_get_persistent() 103 persistent_ref = key_create_persistent(ns, uid, &index_key); in key_get_persistent() 126 * Get the persistent keyring for a specific UID and link it to the nominated 133 kuid_t uid; in keyctl_get_persistent() local 138 uid = current_uid(); in keyctl_get_persistent() [all …]
|