/linux/kernel/ |
H A D | uid16.c | 48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() argument 50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
H A D | sys.c | 191 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 192 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 538 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument 547 keuid = make_kuid(ns, euid); in __sys_setreuid() 551 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid() 563 !uid_eq(old->euid, kruid) && in __sys_setreuid() 568 if (euid != (uid_t) -1) { in __sys_setreuid() 569 new->euid = keuid; in __sys_setreuid() 571 !uid_eq(old->euid, keuid) && in __sys_setreuid() 583 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) in __sys_setreuid() [all …]
|
H A D | uid16.h | 7 long __sys_setreuid(uid_t ruid, uid_t euid); 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | cred.c | 50 .euid = GLOBAL_ROOT_UID, 275 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 366 * ancestor of subset and set->euid is owner of subset or one in cred_cap_issubset() 371 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 406 if (!uid_eq(old->euid, new->euid) || in commit_creds() 445 !uid_eq(new->euid, old->euid) || in commit_creds()
|
H A D | auditsc.c | 393 return audit_compare_uid(cred->euid, name, f, ctx); in audit_field_compare() 411 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare() 419 cred->euid); in audit_field_compare() 428 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 430 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); in audit_field_compare() 508 result = audit_uid_comparator(cred->euid, f->op, f->uid); in audit_filter_rules() 1015 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1666 from_kuid(&init_user_ns, cred->euid), in audit_log_uring()
|
H A D | user_namespace.c | 85 kuid_t owner = new->euid; in create_user_ns() 1175 uid_eq(ns->owner, cred->euid)) { in new_idmap_permitted() 1179 if (uid_eq(uid, cred->euid)) in new_idmap_permitted()
|
/linux/ipc/ |
H A D | util.c | 280 kuid_t euid; in ipc_addid() local 299 current_euid_egid(&euid, &egid); in ipc_addid() 300 new->cuid = new->uid = euid; in ipc_addid() 555 kuid_t euid = current_euid(); in ipcperms() local 561 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 562 uid_eq(euid, ipcp->uid)) in ipcperms() 726 kuid_t euid; in ipcctl_obtain_check() local 741 euid = current_euid(); in ipcctl_obtain_check() 742 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || in ipcctl_obtain_check()
|
/linux/tools/testing/selftests/net/ |
H A D | reuseaddr_ports_exhausted.c | 130 uid_t euid[2] = {10, 20}; in TEST() local 136 ret = seteuid(euid[j]); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST()
|
/linux/security/ |
H A D | commoncap.c | 92 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 772 { return uid_eq(cred->euid, uid); } in __is_eff() 831 { return !uid_eq(new->euid, old->uid); } in __is_setuid() 923 new->euid = new->uid; in cap_bprm_creds_from_file() 930 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1090 uid_eq(old->euid, root_uid) || in cap_emulate_setxuid() 1093 !uid_eq(new->euid, root_uid) && in cap_emulate_setxuid() 1107 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) in cap_emulate_setxuid() 1109 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) in cap_emulate_setxuid()
|
/linux/arch/mips/kernel/ |
H A D | mips-mt-fpaff.c | 57 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 58 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/linux/security/safesetid/ |
H A D | lsm.c | 154 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) || in id_permitted_for_cred() 174 __kuid_val(old->uid), __kuid_val(old->euid), in id_permitted_for_cred() 201 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
|
/linux/lib/ |
H A D | dump_stack.c | 59 __kuid_val(current_real_cred()->euid), in dump_stack_print_info()
|
/linux/include/uapi/linux/ |
H A D | cn_proc.h | 118 __u32 euid; 119 __u32 euid; global() member
|
/linux/security/keys/ |
H A D | keyctl.c | 1682 if (!uid_eq(pcred->uid, mycred->euid) || in keyctl_session_to_parent() 1683 !uid_eq(pcred->euid, mycred->euid) || in keyctl_session_to_parent() 1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent() 1692 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || in keyctl_session_to_parent() 1693 !uid_eq(mycred->session_keyring->uid, mycred->euid)) in keyctl_session_to_parent()
|
H A D | process_keys.c | 929 new-> euid = old-> euid; in key_change_session_keyring()
|
/linux/drivers/staging/greybus/ |
H A D | authentication.c | 87 static int cap_get_endpoint_uid(struct gb_cap *cap, u8 *euid) in cap_get_endpoint_uid() argument 100 memcpy(euid, response.uid, sizeof(response.uid)); in cap_get_endpoint_uid()
|
/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 26 [uid=] [euid=] [gid=] [egid=] 44 euid:= decimal value
|
/linux/drivers/connector/ |
H A D | cn_proc.c | 191 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); in proc_id_connector()
|
/linux/kernel/cgroup/ |
H A D | cgroup-v1.c | 520 if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && in __cgroup1_procs_write() 521 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 522 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/linux/include/linux/ |
H A D | syscalls.h | 684 asmlinkage long sys_setreuid(uid_t ruid, uid_t euid); 686 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 687 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1147 asmlinkage long sys_setreuid16(old_uid_t ruid, old_uid_t euid); 1149 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1151 old_uid_t __user *euid, old_uid_t __user *suid);
|
/linux/kernel/sched/ |
H A D | syscalls.c | 345 return (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 346 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 338 …28000 a1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg… 342 …-13 a0=0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg… 383 …96fcae1fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg… 427 …fcae1fb0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg… 461 …0=1 a1=55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg… 465 …0=1 a1=55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 eg…
|
/linux/tools/testing/selftests/connector/ |
H A D | proc_filter.c | 172 event->event_data.id.e.euid); in handle_packet()
|
/linux/fs/ecryptfs/ |
H A D | messaging.c | 109 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
|
/linux/io_uring/ |
H A D | fdinfo.c | 29 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid)); in io_uring_show_cred()
|