/Linux-v4.19/kernel/ |
D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 61 low2highuid(suid)); in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
D | sys.c | 524 !uid_eq(old->suid, keuid) && in __sys_setreuid() 536 new->suid = new->euid; in __sys_setreuid() 585 new->suid = new->uid = kuid; in __sys_setuid() 591 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid() 618 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument 628 ksuid = make_kuid(ns, suid); in __sys_setresuid() 636 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid() 648 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) in __sys_setresuid() 651 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) in __sys_setresuid() 653 if (suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) && in __sys_setresuid() [all …]
|
D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
D | cred.c | 52 .suid = GLOBAL_ROOT_UID, 476 !uid_eq(new->suid, old->suid) || in commit_creds() 743 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
|
D | auditsc.c | 379 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 393 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 402 cred->suid); in audit_field_compare() 408 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 413 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 488 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
|
D | audit.h | 140 kuid_t uid, euid, suid, fsuid; member
|
D | signal.c | 752 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 754 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1389 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1391 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
D | ptrace.c | 313 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
/Linux-v4.19/arch/s390/kernel/ |
D | compat_linux.c | 126 COMPAT_SYSCALL_DEFINE3(s390_setresuid16, u16, ruid, u16, euid, u16, suid) in COMPAT_SYSCALL_DEFINE3() argument 129 low2highuid(suid)); in COMPAT_SYSCALL_DEFINE3() 137 u16 ruid, euid, suid; in COMPAT_SYSCALL_DEFINE3() local 141 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in COMPAT_SYSCALL_DEFINE3() 145 retval = put_user(suid, suidp); in COMPAT_SYSCALL_DEFINE3()
|
D | compat_linux.h | 98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
D | compat_wrapper.c | 114 COMPAT_SYSCALL_WRAP3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid);
|
/Linux-v4.19/include/linux/ |
D | cred.h | 127 kuid_t suid; /* saved UID of the task */ member 366 #define current_suid() (current_cred_xxx(suid))
|
D | syscalls.h | 650 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 651 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1060 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1062 old_uid_t __user *euid, old_uid_t __user *suid);
|
/Linux-v4.19/drivers/connector/ |
D | Kconfig | 20 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/Linux-v4.19/Documentation/filesystems/cifs/ |
D | README | 81 utility as suid (e.g. "chmod +s /sbin/mount.cifs). To enable users to 88 Note that when the mount.cifs utility is run suid (allowing user mounts), 90 disallow execution of an suid program mounted on the remote target. 92 and execution of suid programs on the remote target would be enabled 95 though to be able to pass the suid flag to mount requires rebuilding 109 as suid (e.g. "chmod +s /sbin/umount.cifs") or equivalent (some distributions 111 equivalent suid effect). For this utility to succeed the target path 116 (instead of using mount.cifs and unmount.cifs as suid) to add a line 363 nosuid Do not allow remote executables with the suid bit 373 suid Allow remote files on this mountpoint with suid enabled to
|
/Linux-v4.19/security/ |
D | commoncap.c | 858 new->suid = new->fsuid = new->euid; in cap_bprm_set_creds() 1011 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 1014 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
|
/Linux-v4.19/security/keys/ |
D | process_keys.c | 856 new-> suid = old-> suid; in key_change_session_keyring()
|
/Linux-v4.19/Documentation/security/ |
D | credentials.rst | 421 uid_t task_cred_xxx(task, suid); 423 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 495 int alter_suid(uid_t suid) 504 new->suid = suid;
|
/Linux-v4.19/net/core/ |
D | scm.c | 60 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/Linux-v4.19/fs/ |
D | fcntl.c | 717 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 718 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/Linux-v4.19/Documentation/filesystems/ |
D | fuse.txt | 245 2) creating a filesystem containing a suid or sgid application, 279 whole system. For example a suid application locking a
|
D | affs.txt | 120 - All other flags (suid, sgid, ...) are ignored and will
|
/Linux-v4.19/fs/proc/ |
D | array.c | 195 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/Linux-v4.19/kernel/cgroup/ |
D | cgroup-v1.c | 544 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/Linux-v4.19/security/integrity/ima/ |
D | ima_policy.c | 309 && !rule->uid_op(cred->suid, rule->uid) in ima_match_rules()
|