/linux-6.3-rc2/kernel/ |
A D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 61 low2highuid(suid)); in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
A D | sys.c | 556 !uid_eq(old->suid, keuid) && in __sys_setreuid() 568 new->suid = new->euid; in __sys_setreuid() 622 new->suid = new->uid = kuid; in __sys_setuid() 670 ksuid = make_kuid(ns, suid); in __sys_setresuid() 710 if (suid != (uid_t) -1) in __sys_setresuid() 711 new->suid = ksuid; in __sys_setresuid() 732 return __sys_setresuid(ruid, euid, suid); in SYSCALL_DEFINE3() 739 uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 743 suid = from_kuid_munged(cred->user_ns, cred->suid); in SYSCALL_DEFINE3() 749 return put_user(suid, suidp); in SYSCALL_DEFINE3() [all …]
|
A D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
A D | cred.c | 49 .suid = GLOBAL_ROOT_UID, 325 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 509 !uid_eq(new->suid, old->suid) || in commit_creds() 851 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
|
A D | auditsc.c | 397 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 411 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 420 cred->suid); in audit_field_compare() 426 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 431 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 509 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules() 1010 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1664 from_kuid(&init_user_ns, cred->suid), in audit_log_uring()
|
A D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member
|
A D | signal.c | 823 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 825 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1505 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1507 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
A D | ptrace.c | 328 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
A D | audit.c | 2250 from_kuid(&init_user_ns, cred->suid), in audit_log_task_info()
|
/linux-6.3-rc2/security/safesetid/ |
A D | lsm.c | 154 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred() 174 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred() 201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
|
/linux-6.3-rc2/drivers/connector/ |
A D | Kconfig | 21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/linux-6.3-rc2/include/linux/ |
A D | cred.h | 121 kuid_t suid; /* saved UID of the task */ member 385 #define current_suid() (current_cred_xxx(suid))
|
A D | syscalls.h | 750 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 751 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1221 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1223 old_uid_t __user *euid, old_uid_t __user *suid);
|
/linux-6.3-rc2/Documentation/admin-guide/cifs/ |
A D | usage.rst | 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to 102 Note that when the mount.cifs utility is run suid (allowing user mounts), 104 disallow execution of an suid program mounted on the remote target. 106 and execution of suid programs on the remote target would be enabled 109 though to be able to pass the suid flag to mount requires rebuilding 124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions 126 equivalent suid effect). For this utility to succeed the target path 131 (instead of using mount.cifs and unmount.cifs as suid) to add a line 415 Do not allow remote executables with the suid bit 429 suid [all …]
|
/linux-6.3-rc2/security/ |
A D | commoncap.c | 929 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1090 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 1093 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
|
/linux-6.3-rc2/Documentation/security/ |
A D | credentials.rst | 420 uid_t task_cred_xxx(task, suid); 422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 494 int alter_suid(uid_t suid) 503 new->suid = suid;
|
/linux-6.3-rc2/io_uring/ |
A D | fdinfo.c | 30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid)); in io_uring_show_cred()
|
/linux-6.3-rc2/security/keys/ |
A D | process_keys.c | 930 new-> suid = old-> suid; in key_change_session_keyring()
|
A D | keyctl.c | 1679 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/linux-6.3-rc2/net/core/ |
A D | scm.c | 57 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/linux-6.3-rc2/fs/ |
A D | fcntl.c | 709 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 710 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | fuse.rst | 230 2. creating a filesystem containing a suid or sgid application, then executing this application 263 whole system. For example a suid application locking a
|
A D | affs.rst | 141 - All other flags (suid, sgid, ...) are ignored and will
|
/linux-6.3-rc2/fs/proc/ |
A D | array.c | 190 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/linux-6.3-rc2/kernel/cgroup/ |
A D | cgroup-v1.c | 517 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|