/linux-master/kernel/ |
H A D | uid16.h | 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | uid16.c | 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) 61 low2highuid(suid)); 68 old_uid_t ruid, euid, suid; local 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); 76 retval = put_user(suid, suidp);
|
H A D | sys.c | 563 !uid_eq(old->suid, keuid) && 575 new->suid = new->euid; 629 new->suid = new->uid = kuid; 635 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { 665 * and suid. This allows you to implement the 4.4 compatible seteuid(). 667 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) argument 678 ksuid = make_kuid(ns, suid); 686 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) 695 (suid == (uid_t) -1 || uid_eq(ksuid, old->suid))) 751 uid_t ruid, euid, suid; local [all...] |
H A D | cred.c | 48 .suid = GLOBAL_ROOT_UID, 275 new->suid = new->fsuid = new->euid; 446 !uid_eq(new->suid, old->suid) ||
|
H A D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member in struct:audit_context
|
H A D | auditsc.c | 399 return audit_compare_uid(cred->suid, name, f, ctx); 413 return audit_uid_comparator(cred->uid, f->op, cred->suid); 422 cred->suid); 428 return audit_uid_comparator(cred->euid, f->op, cred->suid); 431 /* suid comparisons */ 433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); 511 result = audit_uid_comparator(cred->suid, f->op, f->uid); 1013 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); 1661 " ppid=%d pid=%d uid=%u gid=%u euid=%u suid=%u" 1668 from_kuid(&init_user_ns, cred->suid), [all...] |
H A D | signal.c | 820 return uid_eq(cred->euid, tcred->suid) || 822 uid_eq(cred->uid, tcred->suid) || 1524 return uid_eq(cred->euid, pcred->suid) || 1526 uid_eq(cred->uid, pcred->suid) ||
|
H A D | ptrace.c | 318 uid_eq(caller_uid, tcred->suid) &&
|
H A D | audit.c | 2256 " euid=%u suid=%u fsuid=%u" 2264 from_kuid(&init_user_ns, cred->suid),
|
/linux-master/security/safesetid/ |
H A D | lsm.c | 155 uid_eq(new_id.uid, old->suid)) 175 __kuid_val(old->suid), __kuid_val(new_id.uid)); 202 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) &&
|
/linux-master/include/linux/ |
H A D | cred.h | 115 kuid_t suid; /* saved UID of the task */ member in struct:cred 376 #define current_suid() (current_cred_xxx(suid))
|
H A D | syscalls.h | 673 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 674 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1127 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1129 old_uid_t __user *euid, old_uid_t __user *suid);
|
/linux-master/security/keys/ |
H A D | process_keys.c | 930 new-> suid = old-> suid;
|
H A D | keyctl.c | 1683 !uid_eq(pcred->suid, mycred->euid) ||
|
/linux-master/io_uring/ |
H A D | fdinfo.c | 30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
|
/linux-master/security/ |
H A D | commoncap.c | 807 * To support inheritance of root-permissions and suid-root 930 new->suid = new->fsuid = new->euid; 1091 uid_eq(old->suid, root_uid)) && 1094 !uid_eq(new->suid, root_uid))) { 1169 * This is insufficient now since you can call code without suid, but
|
/linux-master/net/core/ |
H A D | scm.c | 59 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) &&
|
/linux-master/fs/ |
H A D | fcntl.c | 726 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || 727 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) &&
|
/linux-master/kernel/cgroup/ |
H A D | cgroup-v1.c | 516 !uid_eq(cred->euid, tcred->suid))
|
/linux-master/fs/proc/ |
H A D | array.c | 191 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid));
|
/linux-master/security/integrity/ima/ |
H A D | ima_policy.c | 609 && !rule->uid_op(cred->suid, rule->uid)
|
/linux-master/fs/fuse/ |
H A D | dir.c | 1421 uid_eq(cred->suid, fc->user_id) && 1439 * excludes processes started by other users, suid or sgid processes. 1958 /* Kill suid/sgid for non-directory chown unconditionally */ 1968 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 2058 * The only sane way to reliably kill suid/sgid is to do it in
|
/linux-master/arch/x86/kernel/cpu/resctrl/ |
H A D | rdtgroup.c | 697 !uid_eq(cred->euid, tcred->suid)) {
|