Home
last modified time | relevance | path

Searched refs:suid (Results 1 – 25 of 29) sorted by relevance

12

/linux/kernel/
H A Duid16.c58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument
61 low2highuid(suid)); in SYSCALL_DEFINE3()
68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local
72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3()
76 retval = put_user(suid, suidp); in SYSCALL_DEFINE3()
H A Dsys.c604 !uid_eq(old->suid, keuid) && in __sys_setreuid()
616 new->suid = new->euid; in __sys_setreuid()
670 new->suid = new->uid = kuid; in __sys_setuid()
676 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) { in __sys_setuid()
706 * and suid. This allows you to implement the 4.4 compatible seteuid().
708 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) in __sys_setresuid() argument
719 ksuid = make_kuid(ns, suid); in __sys_setresuid()
727 if ((suid != (uid_t) -1) && !uid_valid(ksuid)) in __sys_setresuid()
736 (suid == (uid_t) -1 || uid_eq(ksuid, old->suid))) in __sys_setresuid()
783 SYSCALL_DEFINE3(setresuid,uid_t,ruid,uid_t,euid,uid_t,suid) SYSCALL_DEFINE3() argument
792 uid_t ruid, euid, suid; SYSCALL_DEFINE3() local
[all...]
H A Duid16.h9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
H A Dcred.c248 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
425 !uid_eq(new->suid, old->suid) || in commit_creds()
H A Dauditsc.c399 return audit_compare_uid(cred->suid, name, f, ctx); in audit_field_compare()
413 return audit_uid_comparator(cred->uid, f->op, cred->suid); in audit_field_compare()
422 cred->suid); in audit_field_compare()
428 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare()
433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare()
511 result = audit_uid_comparator(cred->suid, f->op, f->uid); in audit_filter_rules()
1015 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context()
1642 from_kuid(&init_user_ns, cred->suid), in audit_log_uring()
H A Daudit.h143 kuid_t uid, euid, suid, fsuid; member
/linux/Documentation/translations/zh_CN/security/
H A Dcredentials.rst360 uid_t task_cred_xxx(task, suid);
362 将从任务中检索‘struct cred::suid’,并执行适当的RCU操作。对于指针成员,
417 int alter_suid(uid_t suid)
426 new->suid = suid;
/linux/security/safesetid/
H A Dlsm.c155 uid_eq(new_id.uid, old->suid)) in id_permitted_for_cred()
175 __kuid_val(old->suid), __kuid_val(new_id.uid)); in id_permitted_for_cred()
202 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid()
/linux/tools/testing/selftests/pidfd/
H A Dpidfd_open_test.c194 if (info.suid != geteuid()) { in main()
196 geteuid(), info.suid); in main()
H A Dpidfd.h189 __u32 suid; member
/linux/drivers/connector/
H A DKconfig21 events such as fork, exec, id change (uid, gid, suid, etc), and exit.
/linux/include/uapi/linux/
H A Dpidfd.h93 __u32 suid; member
/linux/Documentation/admin-guide/cifs/
H A Dusage.rst93 utility as suid (e.g. ``chmod +s /sbin/mount.cifs``). To enable users to
102 Note that when the mount.cifs utility is run suid (allowing user mounts),
104 disallow execution of an suid program mounted on the remote target.
106 and execution of suid programs on the remote target would be enabled
109 though to be able to pass the suid flag to mount requires rebuilding
124 as suid (e.g. ``chmod +s /sbin/umount.cifs``) or equivalent (some distributions
126 equivalent suid effect). For this utility to succeed the target path
131 (instead of using mount.cifs and unmount.cifs as suid) to add a line
417 Do not allow remote executables with the suid bit
431 suid
[all …]
/linux/security/
H A Dcommoncap.c846 * To support inheritance of root-permissions and suid-root in handle_privileged_root()
963 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file()
1126 uid_eq(old->suid, root_uid)) && in cap_emulate_setxuid()
1129 !uid_eq(new->suid, root_uid))) { in cap_emulate_setxuid()
1204 * This is insufficient now since you can call code without suid, but
/linux/Documentation/security/
H A Dcredentials.rst420 uid_t task_cred_xxx(task, suid);
422 will retrieve 'struct cred::suid' from the task, doing the appropriate RCU
494 int alter_suid(uid_t suid)
503 new->suid = suid;
/linux/security/keys/
H A Dprocess_keys.c930 new-> suid = old-> suid; in key_change_session_keyring()
H A Dkeyctl.c1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst351 …1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
355 …0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
396 …fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
440 …0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
505 …55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
509 …55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sg…
/linux/fs/
H A Dpidfs.c421 kinfo.suid = from_kuid_munged(user_ns, c->suid); in pidfd_info()
H A Dfcntl.c848 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
849 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm()
/linux/include/linux/
H A Dsyscalls.h696 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
697 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid);
1166 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid);
1168 old_uid_t __user *euid, old_uid_t __user *suid);
/linux/net/core/
H A Dscm.c61 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst244 2. creating a filesystem containing a suid or sgid application, then executing this application
277 whole system. For example a suid application locking a
/linux/Documentation/filesystems/
H A Daffs.rst141 - All other flags (suid, sgid, ...) are ignored and will
/linux/kernel/cgroup/
H A Dcgroup-v1.c526 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()

12