/Linux-v5.4/kernel/ |
D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 61 low2highuid(suid)); in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
D | sys.c | 527 !uid_eq(old->suid, keuid) && in __sys_setreuid() 539 new->suid = new->euid; in __sys_setreuid() 588 new->suid = new->uid = kuid; in __sys_setuid() 594 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid() 621 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument 631 ksuid = make_kuid(ns, suid); in __sys_setresuid() 639 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid() 651 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) in __sys_setresuid() 654 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) in __sys_setresuid() 656 if (suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) && in __sys_setresuid() [all …]
|
D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
D | cred.c | 49 .suid = GLOBAL_ROOT_UID, 496 !uid_eq(new->suid, old->suid) || in commit_creds() 817 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
|
D | audit.h | 128 kuid_t uid, euid, suid, fsuid; member
|
D | auditsc.c | 373 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 387 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 396 cred->suid); in audit_field_compare() 402 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 407 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 482 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
|
D | signal.c | 811 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 813 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1469 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1471 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
D | ptrace.c | 318 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
/Linux-v5.4/security/safesetid/ |
D | lsm.c | 106 uid_eq(new_uid, old->suid)) in uid_permitted_for_cred() 118 __kuid_val(old->suid), __kuid_val(new_uid)); in uid_permitted_for_cred() 139 uid_permitted_for_cred(old, new->suid) && in safesetid_task_fix_setuid()
|
/Linux-v5.4/arch/s390/kernel/ |
D | compat_linux.h | 98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
/Linux-v5.4/drivers/connector/ |
D | Kconfig | 21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/Linux-v5.4/include/linux/ |
D | cred.h | 122 kuid_t suid; /* saved UID of the task */ member 383 #define current_suid() (current_cred_xxx(suid))
|
D | syscalls.h | 708 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 709 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1165 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1167 old_uid_t __user *euid, old_uid_t __user *suid);
|
/Linux-v5.4/Documentation/admin-guide/cifs/ |
D | usage.rst | 94 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to 103 Note that when the mount.cifs utility is run suid (allowing user mounts), 105 disallow execution of an suid program mounted on the remote target. 107 and execution of suid programs on the remote target would be enabled 110 though to be able to pass the suid flag to mount requires rebuilding 125 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions 127 equivalent suid effect). For this utility to succeed the target path 132 (instead of using mount.cifs and unmount.cifs as suid) to add a line 416 Do not allow remote executables with the suid bit 430 suid [all …]
|
/Linux-v5.4/security/ |
D | commoncap.c | 850 new->suid = new->fsuid = new->euid; in cap_bprm_set_creds() 1003 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 1006 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
|
/Linux-v5.4/Documentation/security/ |
D | credentials.rst | 421 uid_t task_cred_xxx(task, suid); 423 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 495 int alter_suid(uid_t suid) 504 new->suid = suid;
|
/Linux-v5.4/security/keys/ |
D | process_keys.c | 924 new-> suid = old-> suid; in key_change_session_keyring()
|
D | keyctl.c | 1608 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/Linux-v5.4/net/core/ |
D | scm.c | 57 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/Linux-v5.4/fs/ |
D | fcntl.c | 717 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 718 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/Linux-v5.4/Documentation/filesystems/ |
D | fuse.txt | 245 2) creating a filesystem containing a suid or sgid application, 279 whole system. For example a suid application locking a
|
D | affs.txt | 120 - All other flags (suid, sgid, ...) are ignored and will
|
/Linux-v5.4/fs/proc/ |
D | array.c | 195 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/Linux-v5.4/kernel/cgroup/ |
D | cgroup-v1.c | 516 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/Linux-v5.4/security/integrity/ima/ |
D | ima_policy.c | 404 && !rule->uid_op(cred->suid, rule->uid) in ima_match_rules()
|