/linux-4.1.27/kernel/ |
D | uid16.c | 54 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 57 low2highuid(suid)); in SYSCALL_DEFINE3() 64 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 68 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 72 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
|
D | sys.c | 496 !uid_eq(old->suid, keuid) && in SYSCALL_DEFINE2() 508 new->suid = new->euid; in SYSCALL_DEFINE2() 552 new->suid = new->uid = kuid; in SYSCALL_DEFINE1() 558 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in SYSCALL_DEFINE1() 580 SYSCALL_DEFINE3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid) in SYSCALL_DEFINE3() argument 590 ksuid = make_kuid(ns, suid); in SYSCALL_DEFINE3() 598 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in SYSCALL_DEFINE3() 610 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) in SYSCALL_DEFINE3() 613 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) in SYSCALL_DEFINE3() 615 if (suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) && in SYSCALL_DEFINE3() [all …]
|
D | cred.c | 46 .suid = GLOBAL_ROOT_UID, 470 !uid_eq(new->suid, old->suid) || in commit_creds() 735 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds()
|
D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member
|
D | auditsc.c | 377 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare() 390 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare() 397 return audit_uid_comparator(tsk->loginuid, f->op, cred->suid); in audit_field_compare() 402 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 407 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 476 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
|
D | signal.c | 748 if (uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 750 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1374 if (!uid_eq(cred->euid, pcred->suid) && !uid_eq(cred->euid, pcred->uid) && in kill_as_cred_perm() 1375 !uid_eq(cred->uid, pcred->suid) && !uid_eq(cred->uid, pcred->uid)) in kill_as_cred_perm()
|
D | ptrace.c | 261 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
D | audit.c | 1890 from_kuid(&init_user_ns, cred->suid), in audit_log_task_info()
|
D | cgroup.c | 2415 !uid_eq(cred->euid, tcred->suid)) { in __cgroup_procs_write()
|
/linux-4.1.27/arch/s390/kernel/ |
D | compat_linux.c | 126 COMPAT_SYSCALL_DEFINE3(s390_setresuid16, u16, ruid, u16, euid, u16, suid) in COMPAT_SYSCALL_DEFINE3() argument 129 low2highuid(suid)); in COMPAT_SYSCALL_DEFINE3() 137 u16 ruid, euid, suid; in COMPAT_SYSCALL_DEFINE3() local 141 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in COMPAT_SYSCALL_DEFINE3() 145 retval = put_user(suid, suidp); in COMPAT_SYSCALL_DEFINE3()
|
D | compat_linux.h | 97 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 98 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
D | compat_wrapper.c | 139 COMPAT_SYSCALL_WRAP3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid); 140 COMPAT_SYSCALL_WRAP3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid);
|
/linux-4.1.27/drivers/connector/ |
D | Kconfig | 20 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
|
/linux-4.1.27/include/linux/ |
D | cred.h | 129 kuid_t suid; /* saved UID of the task */ member 360 #define current_suid() (current_cred_xxx(suid))
|
D | syscalls.h | 229 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 240 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 537 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 539 old_uid_t __user *euid, old_uid_t __user *suid);
|
/linux-4.1.27/security/ |
D | commoncap.c | 549 new->suid = new->fsuid = new->euid; in cap_bprm_set_creds() 701 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid() 704 !uid_eq(new->suid, root_uid)) && in cap_emulate_setxuid()
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | README | 86 utility as suid (e.g. "chmod +s /sbin/mount.cifs). To enable users to 93 Note that when the mount.cifs utility is run suid (allowing user mounts), 95 disallow execution of an suid program mounted on the remote target. 97 and execution of suid programs on the remote target would be enabled 100 though to be able to pass the suid flag to mount requires rebuilding 116 as suid (e.g. "chmod +s /sbin/umount.cifs") or equivalent (some distributions 118 equivalent suid effect). For this utility to succeed the target path 123 (instead of using mount.cifs and unmount.cifs as suid) to add a line 364 nosuid Do not allow remote executables with the suid bit 374 suid Allow remote files on this mountpoint with suid enabled to
|
/linux-4.1.27/fs/ |
D | fcntl.c | 441 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 442 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
|
/linux-4.1.27/security/keys/ |
D | process_keys.c | 838 new-> suid = old-> suid; in key_change_session_keyring()
|
D | keyctl.c | 1522 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 447 uid_t task_cred_xxx(task, suid); 449 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU 512 int alter_suid(uid_t suid) 521 new->suid = suid;
|
/linux-4.1.27/net/core/ |
D | scm.c | 59 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/linux-4.1.27/Documentation/filesystems/ |
D | fuse.txt | 245 2) creating a filesystem containing a suid or sgid application, 279 whole system. For example a suid application locking a
|
D | affs.txt | 120 - All other flags (suid, sgid, ...) are ignored and will
|
/linux-4.1.27/mm/ |
D | migrate.c | 1492 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && in SYSCALL_DEFINE6() 1493 !uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) && in SYSCALL_DEFINE6()
|
D | mempolicy.c | 1388 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && in SYSCALL_DEFINE4() 1389 !uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) && in SYSCALL_DEFINE4()
|
/linux-4.1.27/fs/proc/ |
D | array.c | 177 from_kuid_munged(user_ns, cred->suid), in task_state()
|
/linux-4.1.27/security/integrity/ima/ |
D | ima_policy.c | 238 && !uid_eq(rule->uid, cred->suid) in ima_match_rules()
|
/linux-4.1.27/fs/fuse/ |
D | dir.c | 1022 uid_eq(cred->suid, fc->user_id) && in fuse_allow_current_process()
|
/linux-4.1.27/arch/ia64/kernel/ |
D | perfmon.c | 2374 from_kuid(&init_user_ns, tcred->suid), in pfm_bad_permissions() 2380 || (!uid_eq(uid, tcred->suid)) in pfm_bad_permissions()
|