/openbmc/linux/kernel/ |
H A D | uid16.c | 48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() argument 50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
H A D | sys.c | 182 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 183 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 529 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument 538 keuid = make_kuid(ns, euid); in __sys_setreuid() 542 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid() 554 !uid_eq(old->euid, kruid) && in __sys_setreuid() 559 if (euid != (uid_t) -1) { in __sys_setreuid() 560 new->euid = keuid; in __sys_setreuid() 562 !uid_eq(old->euid, keuid) && in __sys_setreuid() 574 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) in __sys_setreuid() [all …]
|
H A D | uid16.h | 7 long __sys_setreuid(uid_t ruid, uid_t euid); 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | cred.c | 50 .euid = GLOBAL_ROOT_UID, 270 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 367 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 402 if (!uid_eq(old->euid, new->euid) || in commit_creds() 441 !uid_eq(new->euid, old->euid) || in commit_creds()
|
H A D | auditsc.c | 393 return audit_compare_uid(cred->euid, name, f, ctx); in audit_field_compare() 411 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare() 419 cred->euid); in audit_field_compare() 428 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 430 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); in audit_field_compare() 508 result = audit_uid_comparator(cred->euid, f->op, f->uid); in audit_filter_rules() 1013 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1667 from_kuid(&init_user_ns, cred->euid), in audit_log_uring()
|
H A D | user_namespace.c | 85 kuid_t owner = new->euid; in create_user_ns() 1173 uid_eq(ns->owner, cred->euid)) { in new_idmap_permitted() 1177 if (uid_eq(uid, cred->euid)) in new_idmap_permitted()
|
/openbmc/qemu/bsd-user/ |
H A D | bsd-proc.h | 293 static inline abi_long do_bsd_setresuid(uid_t ruid, uid_t euid, uid_t suid) in do_bsd_setresuid() argument 295 return get_errno(setresuid(ruid, euid, suid)); in do_bsd_setresuid() 303 uid_t ruid, euid, suid; in do_bsd_getresuid() local 305 ret = get_errno(getresuid(&ruid, &euid, &suid)); in do_bsd_getresuid() 312 if (put_user_s32(euid, arg2)) { in do_bsd_getresuid() 326 uid_t ruid, euid, suid; in do_bsd_getresgid() local 328 ret = get_errno(getresgid(&ruid, &euid, &suid)); in do_bsd_getresgid() 335 if (put_user_s32(euid, arg2)) { in do_bsd_getresgid()
|
/openbmc/linux/ipc/ |
H A D | util.c | 280 kuid_t euid; in ipc_addid() local 299 current_euid_egid(&euid, &egid); in ipc_addid() 300 new->cuid = new->uid = euid; in ipc_addid() 555 kuid_t euid = current_euid(); in ipcperms() local 561 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 562 uid_eq(euid, ipcp->uid)) in ipcperms() 726 kuid_t euid; in ipcctl_obtain_check() local 741 euid = current_euid(); in ipcctl_obtain_check() 742 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || in ipcctl_obtain_check()
|
/openbmc/linux/include/linux/ |
H A D | cred.h | 116 kuid_t euid; /* effective UID of the task */ member 322 #define task_euid(task) (task_cred_xxx((task), euid)) 332 #define current_euid() (current_cred_xxx(euid)) 365 *(_euid) = __cred->euid; \
|
H A D | syscalls.h | 653 asmlinkage long sys_setreuid(uid_t ruid, uid_t euid); 655 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 656 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 1108 asmlinkage long sys_setreuid16(old_uid_t ruid, old_uid_t euid); 1110 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 1112 old_uid_t __user *euid, old_uid_t __user *suid);
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | reuseaddr_ports_exhausted.c | 130 uid_t euid[2] = {10, 20}; in TEST() local 136 ret = seteuid(euid[j]); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST()
|
/openbmc/linux/arch/mips/kernel/ |
H A D | mips-mt-fpaff.c | 56 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 57 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/openbmc/linux/security/ |
H A D | commoncap.c | 91 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 771 { return uid_eq(cred->euid, uid); } in __is_eff() 830 { return !uid_eq(new->euid, old->uid); } in __is_setuid() 922 new->euid = new->uid; in cap_bprm_creds_from_file() 929 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1089 uid_eq(old->euid, root_uid) || in cap_emulate_setxuid() 1092 !uid_eq(new->euid, root_uid) && in cap_emulate_setxuid() 1106 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) in cap_emulate_setxuid() 1108 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) in cap_emulate_setxuid()
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/trousers/files/ |
H A D | get-user-ps-path-use-POSIX-getpwent-instead-of-getpwe.patch | 22 uid_t euid; 47 if (euid == pwp->pw_uid) {
|
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 153 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) || in id_permitted_for_cred() 173 __kuid_val(old->uid), __kuid_val(old->euid), in id_permitted_for_cred() 200 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
|
/openbmc/linux/fs/ |
H A D | fcntl.c | 102 filp->f_owner.euid = cred->euid; in __f_setown() 250 src[1] = from_kuid(user_ns, filp->f_owner.euid); in f_getowner_uids() 701 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || in sigio_perm() 702 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
|
/openbmc/linux/arch/alpha/kernel/ |
H A D | asm-offsets.c | 32 DEFINE(CRED_EUID, offsetof(struct cred, euid)); in foo()
|
/openbmc/linux/include/uapi/linux/ |
H A D | cn_proc.h | 118 __u32 euid; member
|
/openbmc/linux/drivers/staging/greybus/ |
H A D | authentication.c | 84 static int cap_get_endpoint_uid(struct gb_cap *cap, u8 *euid) in cap_get_endpoint_uid() argument 97 memcpy(euid, response.uid, sizeof(response.uid)); in cap_get_endpoint_uid()
|
/openbmc/linux/security/keys/ |
H A D | keyctl.c | 1682 if (!uid_eq(pcred->uid, mycred->euid) || in keyctl_session_to_parent() 1683 !uid_eq(pcred->euid, mycred->euid) || in keyctl_session_to_parent() 1684 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent() 1692 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || in keyctl_session_to_parent() 1693 !uid_eq(mycred->session_keyring->uid, mycred->euid)) in keyctl_session_to_parent()
|
H A D | process_keys.c | 929 new-> euid = old-> euid; in key_change_session_keyring()
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 26 [uid=] [euid=] [gid=] [egid=] 44 euid:= decimal value
|
/openbmc/linux/drivers/connector/ |
H A D | cn_proc.c | 191 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); in proc_id_connector()
|
/openbmc/linux/kernel/cgroup/ |
H A D | cgroup-v1.c | 514 if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && in __cgroup1_procs_write() 515 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 516 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
|
/openbmc/linux/tools/testing/selftests/connector/ |
H A D | proc_filter.c | 172 event->event_data.id.e.euid); in handle_packet()
|