/kernel/linux/linux-6.6/net/core/ |
H A D | scm.c | 58 uid_eq(uid, cred->suid)) || ns_capable(cred->user_ns, CAP_SETUID)) && in scm_check_creds()
|
/third_party/rust/crates/nix/src/ |
H A D | unistd.rs | 2785 /// * `suid`: saved user id 2790 pub fn setresuid(ruid: Uid, euid: Uid, suid: Uid) -> Result<()> { in setresuid() 2791 let res = unsafe { libc::setresuid(ruid.into(), euid.into(), suid.into()) }; in setresuid() 2858 let mut suid = libc::uid_t::max_value(); in getresuid() variables 2859 let res = unsafe { libc::getresuid(&mut ruid, &mut euid, &mut suid) }; in getresuid() 2861 Errno::result(res).map(|_| ResUid{ real: Uid(ruid), effective: Uid(euid), saved: Uid(suid) }) in getresuid()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | signal.c | 817 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 819 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1475 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1477 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
H A D | ptrace.c | 333 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
H A D | audit.c | 2258 " euid=%u suid=%u fsuid=%u" in audit_log_task_info() 2266 from_kuid(&init_user_ns, cred->suid), in audit_log_task_info()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | signal.c | 829 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 831 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 1522 return uid_eq(cred->euid, pcred->suid) || in kill_as_cred_perm() 1524 uid_eq(cred->uid, pcred->suid) || in kill_as_cred_perm()
|
H A D | ptrace.c | 329 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
|
H A D | audit.c | 2258 " euid=%u suid=%u fsuid=%u" in audit_log_task_info() 2266 from_kuid(&init_user_ns, cred->suid), in audit_log_task_info()
|
/kernel/linux/linux-5.10/kernel/cgroup/ |
H A D | cgroup-v1.c | 522 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/kernel/linux/linux-5.10/fs/proc/ |
H A D | array.c | 194 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/kernel/linux/linux-6.6/fs/proc/ |
H A D | array.c | 191 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); in task_state()
|
/kernel/linux/linux-6.6/kernel/cgroup/ |
H A D | cgroup-v1.c | 521 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/third_party/rust/crates/libc/src/unix/bsd/freebsdlike/ |
H A D | mod.rs | 1515 pub fn getresuid(ruid: *mut ::uid_t, euid: *mut ::uid_t, suid: *mut ::uid_t) -> ::c_int; in getresuid() 1660 pub fn setresuid(ruid: ::uid_t, euid: ::uid_t, suid: ::uid_t) -> ::c_int; in setresuid()
|
/third_party/rust/crates/libc/src/unix/bsd/netbsdlike/openbsd/ |
H A D | mod.rs | 1778 pub fn getresuid(ruid: *mut ::uid_t, euid: *mut ::uid_t, suid: *mut ::uid_t) -> ::c_int; in getresuid() 1827 pub fn setresuid(ruid: ::uid_t, euid: ::uid_t, suid: ::uid_t) -> ::c_int; in setresuid()
|
/third_party/rust/crates/libc/src/unix/linux_like/ |
H A D | mod.rs | 1764 pub fn getresuid(ruid: *mut ::uid_t, euid: *mut ::uid_t, suid: *mut ::uid_t) -> ::c_int; in getresuid() 1775 pub fn setresuid(ruid: ::uid_t, euid: ::uid_t, suid: ::uid_t) -> ::c_int; in setresuid()
|
/kernel/linux/linux-5.10/security/keys/ |
H A D | keyctl.c | 1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | keyctl.c | 1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
|
/third_party/rust/crates/libc/src/unix/nto/ |
H A D | neutrino.rs | 38 pub suid: ::uid_t,
|
/third_party/python/Modules/ |
H A D | posixmodule.c | 2973 routine can be used in a suid/sgid environment to test if the invoking user 12812 suid: uid_t 12819 os_setresuid_impl(PyObject *module, uid_t ruid, uid_t euid, uid_t suid) in os_setresuid_impl() argument 12822 if (setresuid(ruid, euid, suid) < 0) in os_setresuid_impl() 12863 uid_t ruid, euid, suid; in os_getresuid_impl() local 12864 if (getresuid(&ruid, &euid, &suid) < 0) in os_getresuid_impl() 12868 _PyLong_FromUid(suid)); in os_getresuid_impl()
|
/test/xts/acts/commonlibrary/thirdparty/musl/entry/src/main/cpp/ |
H A D | unistdndk.cpp | 380 uid_t suid = THIRTEEN;
in GetReSuid() local 382 int getInfo = getresuid(&ruid, &euid, &suid);
in GetReSuid()
|
/third_party/python/Modules/clinic/ |
H A D | posixmodule.c.h | 158 " routine can be used in a suid/sgid environment to test if the invoking user\n" 7402 "setresuid($module, ruid, euid, suid, /)\n" 7411 os_setresuid_impl(PyObject *module, uid_t ruid, uid_t euid, uid_t suid); 7419 uid_t suid; in os_setresuid() local 7430 if (!_Py_Uid_Converter(args[2], &suid)) { in os_setresuid() 7433 return_value = os_setresuid_impl(module, ruid, euid, suid); in os_setresuid()
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_policy.c | 533 && !rule->uid_op(cred->suid, rule->uid) in ima_match_rules()
|
/kernel/linux/linux-5.10/fs/fuse/ |
H A D | dir.c | 1205 * excludes processes started by other users, suid or sgid processes. 1216 uid_eq(cred->suid, fc->user_id) && in fuse_allow_current_process() 1790 * The only sane way to reliably kill suid/sgid is to do it in in fuse_setattr()
|
/kernel/linux/linux-6.6/fs/fuse/ |
H A D | dir.c | 1416 uid_eq(cred->suid, fc->user_id) && in fuse_permissible_uidgid() 1434 * excludes processes started by other users, suid or sgid processes. 1930 /* Kill suid/sgid for non-directory chown unconditionally */ in fuse_do_setattr() 1940 /* Kill suid/sgid for truncate only if no CAP_FSETID */ in fuse_do_setattr() 2030 * The only sane way to reliably kill suid/sgid is to do it in in fuse_setattr()
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_policy.c | 609 && !rule->uid_op(cred->suid, rule->uid) in ima_match_rules()
|