Home
last modified time | relevance | path

Searched refs:euid (Results 1 – 25 of 66) sorted by relevance

123

/OK3568_Linux_fs/kernel/kernel/
H A Duid16.c48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() argument
50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2()
58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument
60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3()
68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local
71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3()
75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
H A Dsys.c171 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm()
172 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm()
512 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument
521 keuid = make_kuid(ns, euid); in __sys_setreuid()
525 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid()
537 !uid_eq(old->euid, kruid) && in __sys_setreuid()
542 if (euid != (uid_t) -1) { in __sys_setreuid()
543 new->euid = keuid; in __sys_setreuid()
545 !uid_eq(old->euid, keuid) && in __sys_setreuid()
557 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) in __sys_setreuid()
[all …]
H A Duid16.h7 long __sys_setreuid(uid_t ruid, uid_t euid);
9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
H A Dcred.c53 .euid = GLOBAL_ROOT_UID,
321 new->suid = new->fsuid = new->euid; in prepare_exec_creds()
419 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset()
460 if (!uid_eq(old->euid, new->euid) || in commit_creds()
502 !uid_eq(new->euid, old->euid) || in commit_creds()
823 from_kuid_munged(&init_user_ns, cred->euid), in dump_invalid_creds()
/OK3568_Linux_fs/external/xserver/hw/xfree86/parser/
H A Dwrite.c168 int ruid, euid; in xf86writeConfigFile()
171 euid = geteuid(); in xf86writeConfigFile()
180 if (seteuid(euid) == -1) { in xf86writeConfigFile()
182 euid, strerror(errno)); in xf86writeConfigFile()
/OK3568_Linux_fs/kernel/ipc/
H A Dutil.c279 kuid_t euid; in ipc_addid() local
298 current_euid_egid(&euid, &egid); in ipc_addid()
299 new->cuid = new->uid = euid; in ipc_addid()
521 kuid_t euid = current_euid(); in ipcperms() local
527 if (uid_eq(euid, ipcp->cuid) || in ipcperms()
528 uid_eq(euid, ipcp->uid)) in ipcperms()
692 kuid_t euid; in ipcctl_obtain_check() local
707 euid = current_euid(); in ipcctl_obtain_check()
708 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || in ipcctl_obtain_check()
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/
H A DCVE-2022-4415-2.patch152 + uid_t *euid,
174 + *euid = auxv[i + 1];
197 + uid_t *euid,
219 + *euid = auxv[i + 1];
239 + uid_t uid = UID_INVALID, euid = UID_INVALID;
274 + &at_secure, &uid, &euid, &gid, &egid);
278 + &at_secure, &uid, &euid, &gid, &egid);
283 + * the uid/gid matches euid/egid. */
286 + uid != UID_INVALID && euid != UID_INVALID && uid == euid &&
288 + log_debug("Will %s access (uid="UID_FMT " euid="UID_FMT " gid="GID_FMT " egid="GID_FMT " a…
[all …]
/OK3568_Linux_fs/kernel/security/
H A Dcommoncap.c90 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable()
720 { return uid_eq(cred->euid, uid); } in __is_eff()
779 { return !uid_eq(new->euid, old->uid); } in __is_setuid()
869 new->euid = new->uid; in cap_bprm_creds_from_file()
876 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file()
1027 uid_eq(old->euid, root_uid) || in cap_emulate_setxuid()
1030 !uid_eq(new->euid, root_uid) && in cap_emulate_setxuid()
1044 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) in cap_emulate_setxuid()
1046 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) in cap_emulate_setxuid()
/OK3568_Linux_fs/kernel/tools/testing/selftests/net/
H A Dreuseaddr_ports_exhausted.c130 uid_t euid[2] = {10, 20}; in TEST() local
136 ret = seteuid(euid[j]); in TEST()
137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST()
/OK3568_Linux_fs/kernel/include/linux/
H A Dcred.h124 kuid_t euid; /* effective UID of the task */ member
372 #define task_euid(task) (task_cred_xxx((task), euid))
381 #define current_euid() (current_cred_xxx(euid))
413 *(_euid) = __cred->euid; \
/OK3568_Linux_fs/kernel/arch/mips/kernel/
H A Dmips-mt-fpaff.c56 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner()
57 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
/OK3568_Linux_fs/kernel/arch/s390/kernel/
H A Dcompat_linux.h96 long compat_sys_s390_setreuid16(u16 ruid, u16 euid);
98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid);
99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
/OK3568_Linux_fs/kernel/security/safesetid/
H A Dlsm.c162 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) || in id_permitted_for_cred()
182 __kuid_val(old->uid), __kuid_val(old->euid), in id_permitted_for_cred()
209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
/OK3568_Linux_fs/kernel/fs/
H A Dfcntl.c99 filp->f_owner.euid = cred->euid; in f_modown()
254 src[1] = from_kuid(user_ns, filp->f_owner.euid); in f_getowner_uids()
724 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || in sigio_perm()
725 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
/OK3568_Linux_fs/kernel/Documentation/ABI/testing/
H A Dima_policy26 [euid=] [fowner=] [fsname=]]
41 euid:= decimal value
/OK3568_Linux_fs/kernel/arch/alpha/kernel/
H A Dasm-offsets.c30 DEFINE(CRED_EUID, offsetof(struct cred, euid)); in foo()
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/
H A Dcn_proc.h93 __u32 euid; member
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/
H A Dcn_proc.h93 __u32 euid; member
/OK3568_Linux_fs/kernel/include/uapi/linux/
H A Dcn_proc.h93 __u32 euid; member
/OK3568_Linux_fs/kernel/security/keys/
H A Dkeyctl.c1677 if (!uid_eq(pcred->uid, mycred->euid) || in keyctl_session_to_parent()
1678 !uid_eq(pcred->euid, mycred->euid) || in keyctl_session_to_parent()
1679 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent()
1687 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || in keyctl_session_to_parent()
1688 !uid_eq(mycred->session_keyring->uid, mycred->euid)) in keyctl_session_to_parent()
/OK3568_Linux_fs/external/xserver/os/
H A Dutils.c1581 int ruid, euid; in Fopen() local
1584 euid = geteuid(); in Fopen()
1591 if (seteuid(euid) == -1) { in Fopen()
1740 uid_t ruid, euid, suid; in PrivsElevated()
1743 if ((getresuid(&ruid, &euid, &suid) == 0) && in PrivsElevated()
1745 privsElevated = (euid != suid) || (egid != sgid); in PrivsElevated()
H A Daccess.c1206 lcc->euid = uid; in GetLocalClientCreds()
1215 lcc->euid = ucred_geteuid(peercred); in GetLocalClientCreds()
1216 if (lcc->euid != -1) in GetLocalClientCreds()
1253 lcc->euid = peercred.uid; in GetLocalClientCreds()
2100 if ((lcc->fieldsSet & LCC_UID_SET) && (lcc->euid == siAddrId)) { in siLocalCredAddrMatch()
/OK3568_Linux_fs/kernel/drivers/staging/greybus/
H A Dauthentication.c84 static int cap_get_endpoint_uid(struct gb_cap *cap, u8 *euid) in cap_get_endpoint_uid() argument
97 memcpy(euid, response.uid, sizeof(response.uid)); in cap_get_endpoint_uid()
/OK3568_Linux_fs/kernel/drivers/connector/
H A Dcn_proc.c143 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); in proc_id_connector()
/OK3568_Linux_fs/kernel/block/
H A Dioprio.c44 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio()

123