Symbol: si_uid
arch/arm/kernel/signal.c
697
static_assert(offsetof(siginfo_t, si_uid) == 0x10);
arch/arm64/kernel/signal.c
1707
static_assert(offsetof(siginfo_t, si_uid) == 0x14);
arch/arm64/kernel/signal32.c
477
static_assert(offsetof(compat_siginfo_t, si_uid) == 0x10);
arch/m68k/kernel/signal.c
595
BUILD_BUG_ON(offsetof(siginfo_t, si_uid) != 0x10);
arch/m68k/kernel/signal.c
604
BUILD_BUG_ON(offsetof(siginfo_t, si_uid) != 0x10);
arch/m68k/kernel/signal.c
609
BUILD_BUG_ON(offsetof(siginfo_t, si_uid) != 0x10);
arch/sparc/kernel/signal32.c
767
static_assert(offsetof(compat_siginfo_t, si_uid) == 0x10);
arch/sparc/kernel/signal_64.c
576
static_assert(offsetof(siginfo_t, si_uid) == 0x14);
arch/x86/kernel/signal_32.c
480
static_assert(offsetof(siginfo32_t, si_uid) == 0x10);
arch/x86/kernel/signal_32.c
496
static_assert(offsetof(siginfo32_t, si_uid) == 0x10);
arch/x86/kernel/signal_32.c
502
static_assert(offsetof(siginfo32_t, si_uid) == 0x10);
arch/x86/kernel/signal_64.c
466
static_assert(offsetof(siginfo_t, si_uid) == 0x14);
arch/x86/kernel/signal_64.c
477
static_assert(offsetof(siginfo_t, si_uid) == 0x14);
arch/x86/kernel/signal_64.c
483
static_assert(offsetof(siginfo_t, si_uid) == 0x14);
fs/signalfd.c
127
new.ssi_uid = kinfo->si_uid;
fs/signalfd.c
137
new.ssi_uid = kinfo->si_uid;
fs/signalfd.c
92
new.ssi_uid = kinfo->si_uid;
include/linux/ptrace.h
349
info.si_uid = 0;
io_uring/waitid.c
57
unsafe_put_user(iw->info.uid, &infop->si_uid, Efault);
io_uring/waitid.c
86
unsafe_put_user(iw->info.uid, &iw->infop->si_uid, Efault);
ipc/mqueue.c
806
sig_i.si_uid = from_kuid_munged(info->notify_user_ns,
kernel/exit.c
1837
unsafe_put_user(info.uid, &infop->si_uid, Efault);
kernel/exit.c
1980
unsafe_put_user(info.uid, &infop->si_uid, Efault);
kernel/signal.c
1100
q->info.si_uid =
kernel/signal.c
1111
q->info.si_uid = 0;
kernel/signal.c
1202
kuid_t uid = make_kuid(current_user_ns(), info->si_uid);
kernel/signal.c
1203
info->si_uid = from_kuid_munged(t_user_ns, uid);
kernel/signal.c
1644
info.si_uid = 0;
kernel/signal.c
1658
info.si_uid = 0;
kernel/signal.c
1671
info.si_uid = 0;
kernel/signal.c
2212
info.si_uid = from_kuid_munged(task_cred_xxx(tsk->parent, user_ns),
kernel/signal.c
2303
info.si_uid = from_kuid_munged(task_cred_xxx(parent, user_ns), task_uid(tsk));
kernel/signal.c
2508
info.si_uid = from_kuid_munged(current_user_ns(), current_uid());
kernel/signal.c
2762
info->si_uid = from_kuid_munged(current_user_ns(),
kernel/signal.c
3569
to->si_uid = from->si_uid;
kernel/signal.c
3608
to->si_uid = from->si_uid;
kernel/signal.c
3615
to->si_uid = from->si_uid;
kernel/signal.c
3647
to->si_uid = from->si_uid;
kernel/signal.c
3686
to->si_uid = from->si_uid;
kernel/signal.c
3701
to->si_uid = from->si_uid;
kernel/signal.c
3939
info->si_uid = from_kuid_munged(current_user_ns(), current_uid());
kernel/signal.c
4910
CHECK_OFFSET(si_uid);
kernel/signal.c
4919
CHECK_OFFSET(si_uid);
kernel/signal.c
4924
CHECK_OFFSET(si_uid);
kernel/signal.c
4958
sizeof_field(struct siginfo, si_uid)) !=
kernel/signal.c
4961
offsetof(struct siginfo, si_uid));
kernel/signal.c
599
info->si_uid = 0;
kernel/trace/bpf_trace.c
832
info.si_uid = 0;
tools/testing/selftests/seccomp/seccomp_bpf.c
3134
EXPECT_EQ(getuid(), info.si_uid);