Searched refs:euid (Results 1 - 50 of 50) sorted by relevance

/linux-4.1.27/kernel/
H A Duid16.c44 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) SYSCALL_DEFINE2()
46 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); SYSCALL_DEFINE2()
54 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) SYSCALL_DEFINE3()
56 return sys_setresuid(low2highuid(ruid), low2highuid(euid), SYSCALL_DEFINE3()
64 old_uid_t ruid, euid, suid; SYSCALL_DEFINE3() local
67 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); SYSCALL_DEFINE3()
71 !(retval = put_user(euid, euidp))) SYSCALL_DEFINE3()
H A Dsys.c130 * Returns true if current's euid is same as p's uid or euid,
139 if (uid_eq(pcred->uid, cred->euid) || set_one_prio_perm()
140 uid_eq(pcred->euid, cred->euid)) set_one_prio_perm()
462 SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid) SYSCALL_DEFINE2()
471 keuid = make_kuid(ns, euid); SYSCALL_DEFINE2()
475 if ((euid != (uid_t) -1) && !uid_valid(keuid)) SYSCALL_DEFINE2()
487 !uid_eq(old->euid, kruid) && SYSCALL_DEFINE2()
492 if (euid != (uid_t) -1) { SYSCALL_DEFINE2()
493 new->euid = keuid; SYSCALL_DEFINE2()
495 !uid_eq(old->euid, keuid) && SYSCALL_DEFINE2()
507 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) SYSCALL_DEFINE2()
508 new->suid = new->euid; SYSCALL_DEFINE2()
509 new->fsuid = new->euid; SYSCALL_DEFINE2()
562 new->fsuid = new->euid = kuid; SYSCALL_DEFINE1()
577 * This function implements a generic ability to update ruid, euid,
580 SYSCALL_DEFINE3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid) SYSCALL_DEFINE3()
589 keuid = make_kuid(ns, euid); SYSCALL_DEFINE3()
595 if ((euid != (uid_t) -1) && !uid_valid(keuid)) SYSCALL_DEFINE3()
610 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) SYSCALL_DEFINE3()
612 if (euid != (uid_t) -1 && !uid_eq(keuid, old->uid) && SYSCALL_DEFINE3()
613 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) SYSCALL_DEFINE3()
616 !uid_eq(ksuid, old->euid) && !uid_eq(ksuid, old->suid)) SYSCALL_DEFINE3()
628 if (euid != (uid_t) -1) SYSCALL_DEFINE3()
629 new->euid = keuid; SYSCALL_DEFINE3()
632 new->fsuid = new->euid; SYSCALL_DEFINE3()
649 uid_t ruid, euid, suid; SYSCALL_DEFINE3() local
652 euid = from_kuid_munged(cred->user_ns, cred->euid); SYSCALL_DEFINE3()
657 retval = put_user(euid, euidp); SYSCALL_DEFINE3()
743 * whatever uid it wants to). It normally shadows "euid", except when
764 if (uid_eq(kuid, old->uid) || uid_eq(kuid, old->euid) || SYSCALL_DEFINE1()
1435 if (uid_eq(cred->uid, tcred->euid) && check_prlimit_permission()
H A Dcred.c48 .euid = GLOBAL_ROOT_UID,
391 * ancestor of subset and set->euid is owner of subset or one cred_cap_issubset()
396 uid_eq(subset_ns->owner, set->euid)) cred_cap_issubset()
437 if (!uid_eq(old->euid, new->euid) || commit_creds()
469 !uid_eq(new->euid, old->euid) || commit_creds()
734 from_kuid_munged(&init_user_ns, cred->euid), dump_invalid_creds()
H A Dauditsc.c371 return audit_compare_uid(cred->euid, name, f, ctx); audit_field_compare()
388 return audit_uid_comparator(cred->uid, f->op, cred->euid); audit_field_compare()
395 return audit_uid_comparator(tsk->loginuid, f->op, cred->euid); audit_field_compare()
400 /* euid comparisons */ audit_field_compare()
402 return audit_uid_comparator(cred->euid, f->op, cred->suid); audit_field_compare()
404 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); audit_field_compare()
473 result = audit_uid_comparator(cred->euid, f->op, f->uid); audit_filter_rules()
H A Daudit.h137 kuid_t uid, euid, suid, fsuid; member in struct:audit_context
H A Duser_namespace.c62 kuid_t owner = new->euid; create_user_ns()
824 uid_eq(ns->owner, cred->euid)) { new_idmap_permitted()
828 if (uid_eq(uid, cred->euid)) new_idmap_permitted()
H A Dptrace.c249 * Using the euid would make more sense here, but something __ptrace_may_access()
260 if (uid_eq(caller_uid, tcred->euid) && __ptrace_may_access()
H A Dsignal.c748 if (uid_eq(cred->euid, tcred->suid) || kill_ok_by_cred()
749 uid_eq(cred->euid, tcred->uid) || kill_ok_by_cred()
1374 if (!uid_eq(cred->euid, pcred->suid) && !uid_eq(cred->euid, pcred->uid) && kill_as_cred_perm()
1380 /* like kill_pid_info(), but doesn't use uid/euid of "current" */ kill_pid_info_as_cred()
H A Daudit.c1882 " euid=%u suid=%u fsuid=%u" audit_log_task_info()
1889 from_kuid(&init_user_ns, cred->euid), audit_log_task_info()
H A Dcgroup.c2413 if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && __cgroup_procs_write()
2414 !uid_eq(cred->euid, tcred->uid) && __cgroup_procs_write()
2415 !uid_eq(cred->euid, tcred->suid)) { __cgroup_procs_write()
/linux-4.1.27/tools/testing/selftests/mqueue/
H A Dmq_open_tests.c431 printf("Queue open in excess of rlimit max when euid = 0 " main()
434 printf("Queue open in excess of rlimit max when euid = 0 " main()
439 printf("Queue open with mq_maxmsg > limit when euid = 0 " main()
442 printf("Queue open with mq_maxmsg > limit when euid = 0 " main()
447 printf("Queue open with mq_msgsize > limit when euid = 0 " main()
450 printf("Queue open with mq_msgsize > limit when euid = 0 " main()
455 printf("Queue open with total size > 2GB when euid = 0 " main()
458 printf("Queue open with total size > 2GB when euid = 0 " main()
469 printf("Queue open in excess of rlimit max when euid = 99 " main()
472 printf("Queue open in excess of rlimit max when euid = 99 " main()
477 printf("Queue open with mq_maxmsg > limit when euid = 99 " main()
480 printf("Queue open with mq_maxmsg > limit when euid = 99 " main()
485 printf("Queue open with mq_msgsize > limit when euid = 99 " main()
488 printf("Queue open with mq_msgsize > limit when euid = 99 " main()
493 printf("Queue open with total size > 2GB when euid = 99 " main()
496 printf("Queue open with total size > 2GB when euid = 99 " main()
/linux-4.1.27/arch/alpha/kernel/
H A Dasm-offsets.c29 DEFINE(CRED_EUID, offsetof(struct cred, euid)); foo()
/linux-4.1.27/security/
H A Dcommoncap.c98 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) cap_capable()
504 if (has_cap && !uid_eq(new->uid, root_uid) && uid_eq(new->euid, root_uid)) { cap_bprm_set_creds()
515 if (uid_eq(new->euid, root_uid) || uid_eq(new->uid, root_uid)) { cap_bprm_set_creds()
520 if (uid_eq(new->euid, root_uid)) cap_bprm_set_creds()
535 if ((!uid_eq(new->euid, old->uid) || cap_bprm_set_creds()
542 new->euid = new->uid; cap_bprm_set_creds()
549 new->suid = new->fsuid = new->euid; cap_bprm_set_creds()
572 !uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) || cap_bprm_set_creds()
606 return (!uid_eq(cred->euid, cred->uid) || cap_bprm_secureexec()
674 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective
677 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective
700 uid_eq(old->euid, root_uid) || cap_emulate_setxuid()
703 !uid_eq(new->euid, root_uid) && cap_emulate_setxuid()
709 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) cap_emulate_setxuid()
711 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) cap_emulate_setxuid()
/linux-4.1.27/arch/s390/kernel/
H A Dcompat_linux.h95 long compat_sys_s390_setreuid16(u16 ruid, u16 euid);
97 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid);
98 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
H A Dcompat_linux.c116 COMPAT_SYSCALL_DEFINE2(s390_setreuid16, u16, ruid, u16, euid) COMPAT_SYSCALL_DEFINE2()
118 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); COMPAT_SYSCALL_DEFINE2()
126 COMPAT_SYSCALL_DEFINE3(s390_setresuid16, u16, ruid, u16, euid, u16, suid) COMPAT_SYSCALL_DEFINE3()
128 return sys_setresuid(low2highuid(ruid), low2highuid(euid), COMPAT_SYSCALL_DEFINE3()
137 u16 ruid, euid, suid; COMPAT_SYSCALL_DEFINE3() local
140 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); COMPAT_SYSCALL_DEFINE3()
144 !(retval = put_user(euid, euidp))) COMPAT_SYSCALL_DEFINE3()
H A Dcompat_wrapper.c134 COMPAT_SYSCALL_WRAP2(setreuid, uid_t, ruid, uid_t, euid);
139 COMPAT_SYSCALL_WRAP3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid);
140 COMPAT_SYSCALL_WRAP3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid);
/linux-4.1.27/arch/mips/kernel/
H A Dmips-mt-fpaff.c53 match = (uid_eq(cred->euid, pcred->euid) || check_same_owner()
54 uid_eq(cred->euid, pcred->uid)); check_same_owner()
/linux-4.1.27/include/linux/
H A Dcred.h131 kuid_t euid; /* effective UID of the task */ member in struct:cred
153 struct group_info *group_info; /* supplementary groups for euid/fsgid */
349 #define task_euid(task) (task_cred_xxx((task), euid))
358 #define current_euid() (current_cred_xxx(euid))
388 *(_euid) = __cred->euid; \
H A Dsyscalls.h229 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid);
238 asmlinkage long sys_setreuid(uid_t ruid, uid_t euid);
240 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
535 asmlinkage long sys_setreuid16(old_uid_t ruid, old_uid_t euid);
537 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid);
539 old_uid_t __user *euid, old_uid_t __user *suid);
H A Dfs.h799 rwlock_t lock; /* protects pid, uid, euid fields */
802 kuid_t uid, euid; /* uid/euid of process setting the owner */ member in struct:fown_struct
/linux-4.1.27/ipc/
H A Dutil.c222 kuid_t euid; ipc_addid() local
240 current_euid_egid(&euid, &egid); ipc_addid()
241 new->cuid = new->uid = euid; ipc_addid()
489 kuid_t euid = current_euid(); ipcperms() local
495 if (uid_eq(euid, ipcp->cuid) || ipcperms()
496 uid_eq(euid, ipcp->uid)) ipcperms()
691 kuid_t euid; ipcctl_pre_down_nolock() local
706 euid = current_euid(); ipcctl_pre_down_nolock()
707 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || ipcctl_pre_down_nolock()
H A Dshm.c1028 kuid_t euid = current_euid(); SYSCALL_DEFINE3() local
1029 if (!uid_eq(euid, shp->shm_perm.uid) && SYSCALL_DEFINE3()
1030 !uid_eq(euid, shp->shm_perm.cuid)) { SYSCALL_DEFINE3()
/linux-4.1.27/fs/
H A Dfcntl.c95 filp->f_owner.euid = cred->euid; f_modown()
228 src[1] = from_kuid(user_ns, filp->f_owner.euid); f_getowner_uids()
440 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || sigio_perm()
441 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || sigio_perm()
H A Dexec.c1289 bprm->cred->euid = current_euid(); bprm_fill_uid()
1319 bprm->cred->euid = uid; bprm_fill_uid()
H A Dbinfmt_elf_fdpic.c622 NEW_AUX_ENT(AT_EUID, (elf_addr_t) from_kuid_munged(cred->user_ns, cred->euid)); create_elf_fdpic_tables()
H A Dbinfmt_elf.c244 NEW_AUX_ENT(AT_EUID, from_kuid_munged(cred->user_ns, cred->euid)); create_elf_tables()
/linux-4.1.27/include/uapi/linux/
H A Dcn_proc.h92 __u32 euid; member in union:proc_event::__anon13169::id_proc_event::__anon13172
/linux-4.1.27/arch/cris/include/asm/
H A Deshlibld.h79 int euid, int is_suid);
/linux-4.1.27/fs/cifs/
H A Dcifs_fs_sb.h26 #define CIFS_MOUNT_SET_UID 2 /* set current's euid in create etc. */
/linux-4.1.27/block/
H A Dioprio.c40 if (!uid_eq(tcred->uid, cred->euid) && set_task_ioprio()
/linux-4.1.27/security/integrity/ima/
H A Dima_policy.c237 if (!uid_eq(rule->uid, cred->euid) ima_match_rules()
241 } else if (!uid_eq(rule->uid, cred->euid)) ima_match_rules()
460 {Opt_euid, "euid=%s"},
641 ima_log_string(ab, "euid", args[0].from); ima_parse_rule()
/linux-4.1.27/drivers/connector/
H A Dcn_proc.c144 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); proc_id_connector()
/linux-4.1.27/security/keys/
H A Dkeyctl.c1520 if (!uid_eq(pcred->uid, mycred->euid) || keyctl_session_to_parent()
1521 !uid_eq(pcred->euid, mycred->euid) || keyctl_session_to_parent()
1522 !uid_eq(pcred->suid, mycred->euid) || keyctl_session_to_parent()
1530 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || keyctl_session_to_parent()
1531 !uid_eq(mycred->session_keyring->uid, mycred->euid)) keyctl_session_to_parent()
H A Dprocess_keys.c837 new-> euid = old-> euid; key_change_session_keyring()
/linux-4.1.27/fs/ecryptfs/
H A Dmiscdev.c111 * @inode: inode of fs/ecryptfs/euid handle (ignored)
112 * @file: file for fs/ecryptfs/euid handle
H A Dmessaging.c122 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { ecryptfs_find_daemon_by_euid()
/linux-4.1.27/fs/proc/
H A Dfd.c114 inode->i_uid = cred->euid; tid_fd_revalidate()
H A Darray.c176 from_kuid_munged(user_ns, cred->euid), task_state()
H A Dbase.c531 * or euid/egid (for hide_pid_min=2)?
1482 inode->i_uid = cred->euid; proc_pid_make_inode()
1521 stat->uid = cred->euid; pid_getattr()
1563 inode->i_uid = cred->euid; pid_revalidate()
1696 inode->i_uid = cred->euid; map_files_d_revalidate()
/linux-4.1.27/net/core/
H A Dscm.c58 ((uid_eq(uid, cred->uid) || uid_eq(uid, cred->euid) || scm_check_creds()
H A Dsock.c1007 ucred->uid = from_kuid_munged(current_ns, cred->euid); cred_to_ucred()
/linux-4.1.27/security/tomoyo/
H A Daudit.c164 "uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u " tomoyo_print_header()
H A Dcommon.c74 [TOMOYO_TASK_EUID] = "task.euid",
930 !uid_eq(task->cred->euid, GLOBAL_ROOT_UID))) tomoyo_manager()
/linux-4.1.27/mm/
H A Dmigrate.c1492 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE6()
H A Dmempolicy.c1388 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE4()
/linux-4.1.27/arch/ia64/kernel/
H A Dperfmon.c2370 DPRINT(("cur: uid=%d gid=%d task: euid=%d suid=%d uid=%d egid=%d sgid=%d\n", pfm_bad_permissions()
2373 from_kuid(&init_user_ns, tcred->euid), pfm_bad_permissions()
2379 ret = ((!uid_eq(uid, tcred->euid)) pfm_bad_permissions()
/linux-4.1.27/drivers/net/
H A Dtun.c421 return ((uid_valid(tun->owner) && !uid_eq(cred->euid, tun->owner)) || tun_not_capable()
/linux-4.1.27/fs/fuse/
H A Ddir.c1021 if (uid_eq(cred->euid, fc->user_id) && fuse_allow_current_process()
/linux-4.1.27/lib/
H A Dvsprintf.c1571 !uid_eq(cred->euid, cred->uid) || pointer()
/linux-4.1.27/kernel/sched/
H A Dcore.c3394 match = (uid_eq(cred->euid, pcred->euid) || check_same_owner()
3395 uid_eq(cred->euid, pcred->uid)); check_same_owner()

Completed in 2813 milliseconds