| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | uid16.c | 38 SYSCALL_DEFINE2(setregid16, old_gid_t, rgid, old_gid_t, egid) in SYSCALL_DEFINE2() argument 40 return __sys_setregid(low2highgid(rgid), low2highgid(egid)); in SYSCALL_DEFINE2() 81 SYSCALL_DEFINE3(setresgid16, old_gid_t, rgid, old_gid_t, egid, old_gid_t, sgid) in SYSCALL_DEFINE3() argument 83 return __sys_setresgid(low2highgid(rgid), low2highgid(egid), in SYSCALL_DEFINE3() 91 old_gid_t rgid, egid, sgid; in SYSCALL_DEFINE3() local 94 egid = high2lowgid(from_kgid_munged(cred->user_ns, cred->egid)); in SYSCALL_DEFINE3() 98 !(retval = put_user(egid, egidp))) in SYSCALL_DEFINE3()
|
| H A D | sys.c | 361 long __sys_setregid(gid_t rgid, gid_t egid) in __sys_setregid() argument 370 kegid = make_kgid(ns, egid); in __sys_setregid() 374 if ((egid != (gid_t) -1) && !gid_valid(kegid)) in __sys_setregid() 385 gid_eq(old->egid, krgid) || in __sys_setregid() 391 if (egid != (gid_t) -1) { in __sys_setregid() 393 gid_eq(old->egid, kegid) || in __sys_setregid() 396 new->egid = kegid; in __sys_setregid() 402 (egid != (gid_t) -1 && !gid_eq(kegid, old->gid))) in __sys_setregid() 403 new->sgid = new->egid; in __sys_setregid() 404 new->fsgid = new->egid; in __sys_setregid() [all …]
|
| H A D | uid16.h | 8 long __sys_setregid(gid_t rgid, gid_t egid); 10 long __sys_setresgid(gid_t rgid, gid_t egid, gid_t sgid);
|
| H A D | cred.c | 54 .egid = GLOBAL_ROOT_GID, 322 new->sgid = new->fsgid = new->egid; in prepare_exec_creds() 461 !gid_eq(old->egid, new->egid) || in commit_creds() 508 !gid_eq(new->egid, old->egid) || in commit_creds() 828 from_kgid_munged(&init_user_ns, cred->egid), in dump_invalid_creds()
|
| H A D | groups.c | 236 if (!gid_eq(grp, cred->egid)) in in_egroup_p()
|
| H A D | audit.h | 129 kgid_t gid, egid, sgid, fsgid; member
|
| H A D | auditsc.c | 398 return audit_compare_gid(cred->egid, name, f, ctx); in audit_field_compare() 439 return audit_gid_comparator(cred->gid, f->op, cred->egid); in audit_field_compare() 446 return audit_gid_comparator(cred->egid, f->op, cred->sgid); in audit_field_compare() 448 return audit_gid_comparator(cred->egid, f->op, cred->fsgid); in audit_field_compare() 527 result = audit_gid_comparator(cred->egid, f->op, f->gid); in audit_filter_rules()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | CVE-2022-4415-2.patch | 154 + gid_t *egid) { 180 + *egid = auxv[i + 1]; 199 + gid_t *egid) { 225 + *egid = auxv[i + 1]; 240 + uid_t gid = GID_INVALID, egid = GID_INVALID; 274 + &at_secure, &uid, &euid, &gid, &egid); 278 + &at_secure, &uid, &euid, &gid, &egid); 283 + * the uid/gid matches euid/egid. */ 287 + gid != GID_INVALID && egid != GID_INVALID && gid == egid; 288 + log_debug("Will %s access (uid="UID_FMT " euid="UID_FMT " gid="GID_FMT " egid="GID_FMT " a… [all …]
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | compat_linux.h | 94 long compat_sys_s390_setregid16(u16 rgid, u16 egid); 100 long compat_sys_s390_setresgid16(u16 rgid, u16 egid, u16 sgid); 101 long compat_sys_s390_getresgid16(u16 __user *rgid, u16 __user *egid, u16 __user *sgid);
|
| /OK3568_Linux_fs/kernel/security/safesetid/ |
| H A D | lsm.c | 166 if (gid_eq(new_id.gid, old->gid) || gid_eq(new_id.gid, old->egid) || in id_permitted_for_cred() 186 __kgid_val(old->gid), __kgid_val(old->egid), in id_permitted_for_cred() 233 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) && in safesetid_task_fix_setgid()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | cred.h | 125 kgid_t egid; /* effective GID of the task */ member 382 #define current_egid() (current_cred_xxx(egid)) 414 *(_egid) = __cred->egid; \
|
| H A D | syscalls.h | 733 asmlinkage long sys_setregid(gid_t rgid, gid_t egid); 739 asmlinkage long sys_setresgid(gid_t rgid, gid_t egid, gid_t sgid); 740 asmlinkage long sys_getresgid(gid_t __user *rgid, gid_t __user *egid, gid_t __user *sgid); 1193 asmlinkage long sys_setregid16(old_gid_t rgid, old_gid_t egid); 1200 asmlinkage long sys_setresgid16(old_gid_t rgid, old_gid_t egid, old_gid_t sgid); 1202 old_gid_t __user *egid, old_gid_t __user *sgid);
|
| /OK3568_Linux_fs/kernel/arch/alpha/kernel/ |
| H A D | asm-offsets.c | 32 DEFINE(CRED_EGID, offsetof(struct cred, egid)); in foo()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | cn_proc.h | 94 __u32 egid; member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | cn_proc.h | 94 __u32 egid; member
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | cn_proc.h | 94 __u32 egid; member
|
| /OK3568_Linux_fs/kernel/ipc/ |
| H A D | util.c | 280 kgid_t egid; in ipc_addid() local 298 current_euid_egid(&euid, &egid); in ipc_addid() 300 new->gid = new->cgid = egid; in ipc_addid()
|
| /OK3568_Linux_fs/kernel/drivers/connector/ |
| H A D | cn_proc.c | 146 ev->event_data.id.e.egid = from_kgid_munged(&init_user_ns, cred->egid); in proc_id_connector()
|
| /OK3568_Linux_fs/external/xserver/os/ |
| H A D | access.c | 1207 lcc->egid = gid; in GetLocalClientCreds() 1218 lcc->egid = ucred_getegid(peercred); in GetLocalClientCreds() 1219 if (lcc->egid != -1) in GetLocalClientCreds() 1254 lcc->egid = peercred.gid; in GetLocalClientCreds() 2106 if ((lcc->fieldsSet & LCC_GID_SET) && (lcc->egid == siAddrId)) { in siLocalCredAddrMatch()
|
| H A D | utils.c | 1741 gid_t rgid, egid, sgid; in PrivsElevated() 1744 (getresgid(&rgid, &egid, &sgid) == 0)) { in PrivsElevated() 1745 privsElevated = (euid != suid) || (egid != sgid); in PrivsElevated()
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | commoncap.c | 782 { return !gid_eq(new->egid, old->gid); } in __is_setgid() 870 new->egid = new->gid; in cap_bprm_creds_from_file() 877 new->sgid = new->fsgid = new->egid; in cap_bprm_creds_from_file()
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | keyctl.c | 1680 !gid_eq(pcred->gid, mycred->egid) || in keyctl_session_to_parent() 1681 !gid_eq(pcred->egid, mycred->egid) || in keyctl_session_to_parent() 1682 !gid_eq(pcred->sgid, mycred->egid)) in keyctl_session_to_parent()
|
| H A D | process_keys.c | 925 new-> egid = old-> egid; in key_change_session_keyring()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/qemu/qemu/ |
| H A D | CVE-2022-0358.patch | 30 get egid=0 and get access to resources owned by "root" group. This is
|
| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | scm.c | 58 ((gid_eq(gid, cred->gid) || gid_eq(gid, cred->egid) || in scm_check_creds()
|