| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | uid16.c | 48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() argument 50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
| H A D | sys.c | 171 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 172 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 512 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument 521 keuid = make_kuid(ns, euid); in __sys_setreuid() 525 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid() 537 !uid_eq(old->euid, kruid) && in __sys_setreuid() 542 if (euid != (uid_t) -1) { in __sys_setreuid() 543 new->euid = keuid; in __sys_setreuid() 545 !uid_eq(old->euid, keuid) && in __sys_setreuid() 557 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) in __sys_setreuid() [all …]
|
| H A D | uid16.h | 7 long __sys_setreuid(uid_t ruid, uid_t euid); 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
| H A D | cred.c | 53 .euid = GLOBAL_ROOT_UID, 321 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 419 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 460 if (!uid_eq(old->euid, new->euid) || in commit_creds() 502 !uid_eq(new->euid, old->euid) || in commit_creds() 823 from_kuid_munged(&init_user_ns, cred->euid), in dump_invalid_creds()
|
| /OK3568_Linux_fs/external/xserver/hw/xfree86/parser/ |
| H A D | write.c | 168 int ruid, euid; in xf86writeConfigFile() 171 euid = geteuid(); in xf86writeConfigFile() 180 if (seteuid(euid) == -1) { in xf86writeConfigFile() 182 euid, strerror(errno)); in xf86writeConfigFile()
|
| /OK3568_Linux_fs/kernel/ipc/ |
| H A D | util.c | 279 kuid_t euid; in ipc_addid() local 298 current_euid_egid(&euid, &egid); in ipc_addid() 299 new->cuid = new->uid = euid; in ipc_addid() 521 kuid_t euid = current_euid(); in ipcperms() local 527 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 528 uid_eq(euid, ipcp->uid)) in ipcperms() 692 kuid_t euid; in ipcctl_obtain_check() local 707 euid = current_euid(); in ipcctl_obtain_check() 708 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || in ipcctl_obtain_check()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | CVE-2022-4415-2.patch | 152 + uid_t *euid, 174 + *euid = auxv[i + 1]; 197 + uid_t *euid, 219 + *euid = auxv[i + 1]; 239 + uid_t uid = UID_INVALID, euid = UID_INVALID; 274 + &at_secure, &uid, &euid, &gid, &egid); 278 + &at_secure, &uid, &euid, &gid, &egid); 283 + * the uid/gid matches euid/egid. */ 286 + uid != UID_INVALID && euid != UID_INVALID && uid == euid && 288 + log_debug("Will %s access (uid="UID_FMT " euid="UID_FMT " gid="GID_FMT " egid="GID_FMT " a… [all …]
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | commoncap.c | 90 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 720 { return uid_eq(cred->euid, uid); } in __is_eff() 779 { return !uid_eq(new->euid, old->uid); } in __is_setuid() 869 new->euid = new->uid; in cap_bprm_creds_from_file() 876 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1027 uid_eq(old->euid, root_uid) || in cap_emulate_setxuid() 1030 !uid_eq(new->euid, root_uid) && in cap_emulate_setxuid() 1044 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) in cap_emulate_setxuid() 1046 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) in cap_emulate_setxuid()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/net/ |
| H A D | reuseaddr_ports_exhausted.c | 130 uid_t euid[2] = {10, 20}; in TEST() local 136 ret = seteuid(euid[j]); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | cred.h | 124 kuid_t euid; /* effective UID of the task */ member 372 #define task_euid(task) (task_cred_xxx((task), euid)) 381 #define current_euid() (current_cred_xxx(euid)) 413 *(_euid) = __cred->euid; \
|
| /OK3568_Linux_fs/kernel/arch/mips/kernel/ |
| H A D | mips-mt-fpaff.c | 56 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 57 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | compat_linux.h | 96 long compat_sys_s390_setreuid16(u16 ruid, u16 euid); 98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
| /OK3568_Linux_fs/kernel/security/safesetid/ |
| H A D | lsm.c | 162 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) || in id_permitted_for_cred() 182 __kuid_val(old->uid), __kuid_val(old->euid), in id_permitted_for_cred() 209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
|
| /OK3568_Linux_fs/kernel/fs/ |
| H A D | fcntl.c | 99 filp->f_owner.euid = cred->euid; in f_modown() 254 src[1] = from_kuid(user_ns, filp->f_owner.euid); in f_getowner_uids() 724 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || in sigio_perm() 725 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | ima_policy | 26 [euid=] [fowner=] [fsname=]] 41 euid:= decimal value
|
| /OK3568_Linux_fs/kernel/arch/alpha/kernel/ |
| H A D | asm-offsets.c | 30 DEFINE(CRED_EUID, offsetof(struct cred, euid)); in foo()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | cn_proc.h | 93 __u32 euid; member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | cn_proc.h | 93 __u32 euid; member
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | cn_proc.h | 93 __u32 euid; member
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | keyctl.c | 1677 if (!uid_eq(pcred->uid, mycred->euid) || in keyctl_session_to_parent() 1678 !uid_eq(pcred->euid, mycred->euid) || in keyctl_session_to_parent() 1679 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent() 1687 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || in keyctl_session_to_parent() 1688 !uid_eq(mycred->session_keyring->uid, mycred->euid)) in keyctl_session_to_parent()
|
| /OK3568_Linux_fs/external/xserver/os/ |
| H A D | utils.c | 1581 int ruid, euid; in Fopen() local 1584 euid = geteuid(); in Fopen() 1591 if (seteuid(euid) == -1) { in Fopen() 1740 uid_t ruid, euid, suid; in PrivsElevated() 1743 if ((getresuid(&ruid, &euid, &suid) == 0) && in PrivsElevated() 1745 privsElevated = (euid != suid) || (egid != sgid); in PrivsElevated()
|
| H A D | access.c | 1206 lcc->euid = uid; in GetLocalClientCreds() 1215 lcc->euid = ucred_geteuid(peercred); in GetLocalClientCreds() 1216 if (lcc->euid != -1) in GetLocalClientCreds() 1253 lcc->euid = peercred.uid; in GetLocalClientCreds() 2100 if ((lcc->fieldsSet & LCC_UID_SET) && (lcc->euid == siAddrId)) { in siLocalCredAddrMatch()
|
| /OK3568_Linux_fs/kernel/drivers/staging/greybus/ |
| H A D | authentication.c | 84 static int cap_get_endpoint_uid(struct gb_cap *cap, u8 *euid) in cap_get_endpoint_uid() argument 97 memcpy(euid, response.uid, sizeof(response.uid)); in cap_get_endpoint_uid()
|
| /OK3568_Linux_fs/kernel/drivers/connector/ |
| H A D | cn_proc.c | 143 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); in proc_id_connector()
|
| /OK3568_Linux_fs/kernel/block/ |
| H A D | ioprio.c | 44 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio()
|