/linux-6.12.1/kernel/ |
D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 61 low2highuid(suid)); in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
D | sys.c | 572 !uid_eq(old->suid, keuid) && in __sys_setreuid() 584 new->suid = new->euid; in __sys_setreuid() 638 new->suid = new->uid = kuid; in __sys_setuid() 644 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid() 676 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument 687 ksuid = make_kuid(ns, suid); in __sys_setresuid() 695 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid() 704 (suid == (uid_t) -1 || uid_eq(ksuid, old->suid))) in __sys_setresuid() 708 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid); in __sys_setresuid() 710 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid); in __sys_setresuid() [all …]
|
D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
D | cred.c | 48 .suid = GLOBAL_ROOT_UID, 275 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 446 !uid_eq(new->suid, old->suid) || in commit_creds()
|
D | auditsc.c | 399 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 413 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 422 cred->suid); in audit_field_compare() 428 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 511 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules() 1013 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1668 from_kuid(&init_user_ns, cred->suid), in audit_log_uring()
|
D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member
|
D | signal.c | 819 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 821 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1521 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1523 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
D | ptrace.c | 318 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
/linux-6.12.1/security/safesetid/ |
D | lsm.c | 155 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred() 175 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred() 202 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
|
/linux-6.12.1/include/linux/ |
D | cred.h | 115 kuid_t suid; /* saved UID of the task */ member 376 #define current_suid() (current_cred_xxx(suid))
|
D | syscalls.h | 673 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 674 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1136 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1138 old_uid_t __user *euid, old_uid_t __user *suid);
|
/linux-6.12.1/drivers/connector/ |
D | Kconfig | 21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/linux-6.12.1/Documentation/admin-guide/cifs/ |
D | usage.rst | 93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to 102 Note that when the mount.cifs utility is run suid (allowing user mounts), 104 disallow execution of an suid program mounted on the remote target. 106 and execution of suid programs on the remote target would be enabled 109 though to be able to pass the suid flag to mount requires rebuilding 124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions 126 equivalent suid effect). For this utility to succeed the target path 131 (instead of using mount.cifs and unmount.cifs as suid) to add a line 415 Do not allow remote executables with the suid bit 429 suid [all …]
|
/linux-6.12.1/security/ |
D | commoncap.c | 930 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1091 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 1094 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
|
/linux-6.12.1/Documentation/security/ |
D | credentials.rst | 420 uid_t task_cred_xxx(task, suid); 422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 494 int alter_suid(uid_t suid) 503 new->suid = suid;
|
/linux-6.12.1/security/keys/ |
D | process_keys.c | 930 new-> suid = old-> suid; in key_change_session_keyring()
|
D | keyctl.c | 1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | ipe.rst | 338 …1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg… 342 …0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg… 383 …fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg… 427 …0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg… 461 …55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg… 465 …55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
|
/linux-6.12.1/io_uring/ |
D | fdinfo.c | 30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid)); in io_uring_show_cred()
|
/linux-6.12.1/net/core/ |
D | scm.c | 59 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/linux-6.12.1/fs/ |
D | fcntl.c | 840 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 841 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/linux-6.12.1/Documentation/filesystems/ |
D | fuse.rst | 230 2. creating a filesystem containing a suid or sgid application, then executing this application 263 whole system. For example a suid application locking a
|
D | affs.rst | 141 - All other flags (suid, sgid, ...) are ignored and will
|
/linux-6.12.1/fs/proc/ |
D | array.c | 191 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/linux-6.12.1/kernel/cgroup/ |
D | cgroup-v1.c | 522 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|