Home
last modified time | relevance | path

Searched refs:suid (Results 1 – 25 of 28) sorted by relevance

12

/linux-6.1.9/kernel/
Duid16.c58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument
61 low2highuid(suid)); in SYSCALL_DEFINE3()
68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local
72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3()
76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
Dsys.c556 !uid_eq(old->suid, keuid) && in __sys_setreuid()
568 new->suid = new->euid; in __sys_setreuid()
622 new->suid = new->uid = kuid; in __sys_setuid()
628 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid()
660 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument
670 ksuid = make_kuid(ns, suid); in __sys_setresuid()
678 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid()
690 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) in __sys_setresuid()
693 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) in __sys_setresuid()
695 if (suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) && in __sys_setresuid()
[all …]
Duid16.h9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
Dcred.c49 .suid = GLOBAL_ROOT_UID,
325 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
509 !uid_eq(new->suid, old->suid) || in commit_creds()
852 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
Dauditsc.c396 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare()
410 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare()
419 cred->suid); in audit_field_compare()
425 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare()
430 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare()
508 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
1006 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context()
1664 from_kuid(&init_user_ns, cred->suid), in audit_log_uring()
Daudit.h137 kuid_t uid, euid, suid, fsuid; member
Dsignal.c823 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred()
825 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred()
1505 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm()
1507 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
Dptrace.c328 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
Daudit.c2250 from_kuid(&init_user_ns, cred->suid), in audit_log_task_info()
/linux-6.1.9/security/safesetid/
Dlsm.c154 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred()
174 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred()
201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
/linux-6.1.9/drivers/connector/
DKconfig21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
/linux-6.1.9/include/linux/
Dcred.h121 kuid_t suid; /* saved UID of the task */ member
385 #define current_suid() (current_cred_xxx(suid))
Dsyscalls.h748 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
749 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid);
1219 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid);
1221 old_uid_t __user *euid, old_uid_t __user *suid);
/linux-6.1.9/Documentation/admin-guide/cifs/
Dusage.rst93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
102 Note that when the mount.cifs utility is run suid (allowing user mounts),
104 disallow execution of an suid program mounted on the remote target.
106 and execution of suid programs on the remote target would be enabled
109 though to be able to pass the suid flag to mount requires rebuilding
124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions
126 equivalent suid effect). For this utility to succeed the target path
131 (instead of using mount.cifs and unmount.cifs as suid) to add a line
415 Do not allow remote executables with the suid bit
429 suid
[all …]
/linux-6.1.9/security/
Dcommoncap.c937 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file()
1098 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid()
1101 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
/linux-6.1.9/Documentation/security/
Dcredentials.rst420 uid_t task_cred_xxx(task, suid);
422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU
494 int alter_suid(uid_t suid)
503 new->suid = suid;
/linux-6.1.9/io_uring/
Dfdinfo.c31 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid)); in io_uring_show_cred()
/linux-6.1.9/security/keys/
Dprocess_keys.c930 new-> suid = old-> suid; in key_change_session_keyring()
Dkeyctl.c1679 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
/linux-6.1.9/net/core/
Dscm.c57 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
/linux-6.1.9/fs/
Dfcntl.c708 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
709 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
/linux-6.1.9/Documentation/filesystems/
Dfuse.rst230 2. creating a filesystem containing a suid or sgid application, then executing this application
263 whole system. For example a suid application locking a
Daffs.rst141 - All other flags (suid, sgid, ...) are ignored and will
/linux-6.1.9/fs/proc/
Darray.c190 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
/linux-6.1.9/kernel/cgroup/
Dcgroup-v1.c517 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()

12