/linux-4.1.27/kernel/ |
H A D | uid16.c | 44 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) SYSCALL_DEFINE2() 46 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); SYSCALL_DEFINE2() 54 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) SYSCALL_DEFINE3() 56 return sys_setresuid(low2highuid(ruid), low2highuid(euid), SYSCALL_DEFINE3() 64 old_uid_t ruid, euid, suid; SYSCALL_DEFINE3() local 67 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); SYSCALL_DEFINE3() 71 !(retval = put_user(euid, euidp))) SYSCALL_DEFINE3()
|
H A D | sys.c | 130 * Returns true if current's euid is same as p's uid or euid, 139 if (uid_eq(pcred->uid, cred->euid) || set_one_prio_perm() 140 uid_eq(pcred->euid, cred->euid)) set_one_prio_perm() 462 SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid) SYSCALL_DEFINE2() 471 keuid = make_kuid(ns, euid); SYSCALL_DEFINE2() 475 if ((euid != (uid_t) -1) && !uid_valid(keuid)) SYSCALL_DEFINE2() 487 !uid_eq(old->euid, kruid) && SYSCALL_DEFINE2() 492 if (euid != (uid_t) -1) { SYSCALL_DEFINE2() 493 new->euid = keuid; SYSCALL_DEFINE2() 495 !uid_eq(old->euid, keuid) && SYSCALL_DEFINE2() 507 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) SYSCALL_DEFINE2() 508 new->suid = new->euid; SYSCALL_DEFINE2() 509 new->fsuid = new->euid; SYSCALL_DEFINE2() 562 new->fsuid = new->euid = kuid; SYSCALL_DEFINE1() 577 * This function implements a generic ability to update ruid, euid, 580 SYSCALL_DEFINE3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid) SYSCALL_DEFINE3() 589 keuid = make_kuid(ns, euid); SYSCALL_DEFINE3() 595 if ((euid != (uid_t) -1) && !uid_valid(keuid)) SYSCALL_DEFINE3() 610 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid)) SYSCALL_DEFINE3() 612 if (euid != (uid_t) -1 && !uid_eq(keuid, old->uid) && SYSCALL_DEFINE3() 613 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid)) SYSCALL_DEFINE3() 616 !uid_eq(ksuid, old->euid) && !uid_eq(ksuid, old->suid)) SYSCALL_DEFINE3() 628 if (euid != (uid_t) -1) SYSCALL_DEFINE3() 629 new->euid = keuid; SYSCALL_DEFINE3() 632 new->fsuid = new->euid; SYSCALL_DEFINE3() 649 uid_t ruid, euid, suid; SYSCALL_DEFINE3() local 652 euid = from_kuid_munged(cred->user_ns, cred->euid); SYSCALL_DEFINE3() 657 retval = put_user(euid, euidp); SYSCALL_DEFINE3() 743 * whatever uid it wants to). It normally shadows "euid", except when 764 if (uid_eq(kuid, old->uid) || uid_eq(kuid, old->euid) || SYSCALL_DEFINE1() 1435 if (uid_eq(cred->uid, tcred->euid) && check_prlimit_permission()
|
H A D | cred.c | 48 .euid = GLOBAL_ROOT_UID, 391 * ancestor of subset and set->euid is owner of subset or one cred_cap_issubset() 396 uid_eq(subset_ns->owner, set->euid)) cred_cap_issubset() 437 if (!uid_eq(old->euid, new->euid) || commit_creds() 469 !uid_eq(new->euid, old->euid) || commit_creds() 734 from_kuid_munged(&init_user_ns, cred->euid), dump_invalid_creds()
|
H A D | auditsc.c | 371 return audit_compare_uid(cred->euid, name, f, ctx); audit_field_compare() 388 return audit_uid_comparator(cred->uid, f->op, cred->euid); audit_field_compare() 395 return audit_uid_comparator(tsk->loginuid, f->op, cred->euid); audit_field_compare() 400 /* euid comparisons */ audit_field_compare() 402 return audit_uid_comparator(cred->euid, f->op, cred->suid); audit_field_compare() 404 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); audit_field_compare() 473 result = audit_uid_comparator(cred->euid, f->op, f->uid); audit_filter_rules()
|
H A D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member in struct:audit_context
|
H A D | user_namespace.c | 62 kuid_t owner = new->euid; create_user_ns() 824 uid_eq(ns->owner, cred->euid)) { new_idmap_permitted() 828 if (uid_eq(uid, cred->euid)) new_idmap_permitted()
|
H A D | ptrace.c | 249 * Using the euid would make more sense here, but something __ptrace_may_access() 260 if (uid_eq(caller_uid, tcred->euid) && __ptrace_may_access()
|
H A D | signal.c | 748 if (uid_eq(cred->euid, tcred->suid) || kill_ok_by_cred() 749 uid_eq(cred->euid, tcred->uid) || kill_ok_by_cred() 1374 if (!uid_eq(cred->euid, pcred->suid) && !uid_eq(cred->euid, pcred->uid) && kill_as_cred_perm() 1380 /* like kill_pid_info(), but doesn't use uid/euid of "current" */ kill_pid_info_as_cred()
|
H A D | audit.c | 1882 " euid=%u suid=%u fsuid=%u" audit_log_task_info() 1889 from_kuid(&init_user_ns, cred->euid), audit_log_task_info()
|
H A D | cgroup.c | 2413 if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && __cgroup_procs_write() 2414 !uid_eq(cred->euid, tcred->uid) && __cgroup_procs_write() 2415 !uid_eq(cred->euid, tcred->suid)) { __cgroup_procs_write()
|
/linux-4.1.27/tools/testing/selftests/mqueue/ |
H A D | mq_open_tests.c | 431 printf("Queue open in excess of rlimit max when euid = 0 " main() 434 printf("Queue open in excess of rlimit max when euid = 0 " main() 439 printf("Queue open with mq_maxmsg > limit when euid = 0 " main() 442 printf("Queue open with mq_maxmsg > limit when euid = 0 " main() 447 printf("Queue open with mq_msgsize > limit when euid = 0 " main() 450 printf("Queue open with mq_msgsize > limit when euid = 0 " main() 455 printf("Queue open with total size > 2GB when euid = 0 " main() 458 printf("Queue open with total size > 2GB when euid = 0 " main() 469 printf("Queue open in excess of rlimit max when euid = 99 " main() 472 printf("Queue open in excess of rlimit max when euid = 99 " main() 477 printf("Queue open with mq_maxmsg > limit when euid = 99 " main() 480 printf("Queue open with mq_maxmsg > limit when euid = 99 " main() 485 printf("Queue open with mq_msgsize > limit when euid = 99 " main() 488 printf("Queue open with mq_msgsize > limit when euid = 99 " main() 493 printf("Queue open with total size > 2GB when euid = 99 " main() 496 printf("Queue open with total size > 2GB when euid = 99 " main()
|
/linux-4.1.27/arch/alpha/kernel/ |
H A D | asm-offsets.c | 29 DEFINE(CRED_EUID, offsetof(struct cred, euid)); foo()
|
/linux-4.1.27/security/ |
H A D | commoncap.c | 98 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) cap_capable() 504 if (has_cap && !uid_eq(new->uid, root_uid) && uid_eq(new->euid, root_uid)) { cap_bprm_set_creds() 515 if (uid_eq(new->euid, root_uid) || uid_eq(new->uid, root_uid)) { cap_bprm_set_creds() 520 if (uid_eq(new->euid, root_uid)) cap_bprm_set_creds() 535 if ((!uid_eq(new->euid, old->uid) || cap_bprm_set_creds() 542 new->euid = new->uid; cap_bprm_set_creds() 549 new->suid = new->fsuid = new->euid; cap_bprm_set_creds() 572 !uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) || cap_bprm_set_creds() 606 return (!uid_eq(cred->euid, cred->uid) || cap_bprm_secureexec() 674 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective 677 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective 700 uid_eq(old->euid, root_uid) || cap_emulate_setxuid() 703 !uid_eq(new->euid, root_uid) && cap_emulate_setxuid() 709 if (uid_eq(old->euid, root_uid) && !uid_eq(new->euid, root_uid)) cap_emulate_setxuid() 711 if (!uid_eq(old->euid, root_uid) && uid_eq(new->euid, root_uid)) cap_emulate_setxuid()
|
/linux-4.1.27/arch/s390/kernel/ |
H A D | compat_linux.h | 95 long compat_sys_s390_setreuid16(u16 ruid, u16 euid); 97 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 98 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
H A D | compat_linux.c | 116 COMPAT_SYSCALL_DEFINE2(s390_setreuid16, u16, ruid, u16, euid) COMPAT_SYSCALL_DEFINE2() 118 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); COMPAT_SYSCALL_DEFINE2() 126 COMPAT_SYSCALL_DEFINE3(s390_setresuid16, u16, ruid, u16, euid, u16, suid) COMPAT_SYSCALL_DEFINE3() 128 return sys_setresuid(low2highuid(ruid), low2highuid(euid), COMPAT_SYSCALL_DEFINE3() 137 u16 ruid, euid, suid; COMPAT_SYSCALL_DEFINE3() local 140 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); COMPAT_SYSCALL_DEFINE3() 144 !(retval = put_user(euid, euidp))) COMPAT_SYSCALL_DEFINE3()
|
H A D | compat_wrapper.c | 134 COMPAT_SYSCALL_WRAP2(setreuid, uid_t, ruid, uid_t, euid); 139 COMPAT_SYSCALL_WRAP3(setresuid, uid_t, ruid, uid_t, euid, uid_t, suid); 140 COMPAT_SYSCALL_WRAP3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid);
|
/linux-4.1.27/arch/mips/kernel/ |
H A D | mips-mt-fpaff.c | 53 match = (uid_eq(cred->euid, pcred->euid) || check_same_owner() 54 uid_eq(cred->euid, pcred->uid)); check_same_owner()
|
/linux-4.1.27/include/linux/ |
H A D | cred.h | 131 kuid_t euid; /* effective UID of the task */ member in struct:cred 153 struct group_info *group_info; /* supplementary groups for euid/fsgid */ 349 #define task_euid(task) (task_cred_xxx((task), euid)) 358 #define current_euid() (current_cred_xxx(euid)) 388 *(_euid) = __cred->euid; \
|
H A D | syscalls.h | 229 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 238 asmlinkage long sys_setreuid(uid_t ruid, uid_t euid); 240 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 535 asmlinkage long sys_setreuid16(old_uid_t ruid, old_uid_t euid); 537 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 539 old_uid_t __user *euid, old_uid_t __user *suid);
|
H A D | fs.h | 799 rwlock_t lock; /* protects pid, uid, euid fields */ 802 kuid_t uid, euid; /* uid/euid of process setting the owner */ member in struct:fown_struct
|
/linux-4.1.27/ipc/ |
H A D | util.c | 222 kuid_t euid; ipc_addid() local 240 current_euid_egid(&euid, &egid); ipc_addid() 241 new->cuid = new->uid = euid; ipc_addid() 489 kuid_t euid = current_euid(); ipcperms() local 495 if (uid_eq(euid, ipcp->cuid) || ipcperms() 496 uid_eq(euid, ipcp->uid)) ipcperms() 691 kuid_t euid; ipcctl_pre_down_nolock() local 706 euid = current_euid(); ipcctl_pre_down_nolock() 707 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || ipcctl_pre_down_nolock()
|
H A D | shm.c | 1028 kuid_t euid = current_euid(); SYSCALL_DEFINE3() local 1029 if (!uid_eq(euid, shp->shm_perm.uid) && SYSCALL_DEFINE3() 1030 !uid_eq(euid, shp->shm_perm.cuid)) { SYSCALL_DEFINE3()
|
/linux-4.1.27/fs/ |
H A D | fcntl.c | 95 filp->f_owner.euid = cred->euid; f_modown() 228 src[1] = from_kuid(user_ns, filp->f_owner.euid); f_getowner_uids() 440 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || sigio_perm() 441 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || sigio_perm()
|
H A D | exec.c | 1289 bprm->cred->euid = current_euid(); bprm_fill_uid() 1319 bprm->cred->euid = uid; bprm_fill_uid()
|
H A D | binfmt_elf_fdpic.c | 622 NEW_AUX_ENT(AT_EUID, (elf_addr_t) from_kuid_munged(cred->user_ns, cred->euid)); create_elf_fdpic_tables()
|
H A D | binfmt_elf.c | 244 NEW_AUX_ENT(AT_EUID, from_kuid_munged(cred->user_ns, cred->euid)); create_elf_tables()
|
/linux-4.1.27/include/uapi/linux/ |
H A D | cn_proc.h | 92 __u32 euid; member in union:proc_event::__anon13169::id_proc_event::__anon13172
|
/linux-4.1.27/arch/cris/include/asm/ |
H A D | eshlibld.h | 79 int euid, int is_suid);
|
/linux-4.1.27/fs/cifs/ |
H A D | cifs_fs_sb.h | 26 #define CIFS_MOUNT_SET_UID 2 /* set current's euid in create etc. */
|
/linux-4.1.27/block/ |
H A D | ioprio.c | 40 if (!uid_eq(tcred->uid, cred->euid) && set_task_ioprio()
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima_policy.c | 237 if (!uid_eq(rule->uid, cred->euid) ima_match_rules() 241 } else if (!uid_eq(rule->uid, cred->euid)) ima_match_rules() 460 {Opt_euid, "euid=%s"}, 641 ima_log_string(ab, "euid", args[0].from); ima_parse_rule()
|
/linux-4.1.27/drivers/connector/ |
H A D | cn_proc.c | 144 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); proc_id_connector()
|
/linux-4.1.27/security/keys/ |
H A D | keyctl.c | 1520 if (!uid_eq(pcred->uid, mycred->euid) || keyctl_session_to_parent() 1521 !uid_eq(pcred->euid, mycred->euid) || keyctl_session_to_parent() 1522 !uid_eq(pcred->suid, mycred->euid) || keyctl_session_to_parent() 1530 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || keyctl_session_to_parent() 1531 !uid_eq(mycred->session_keyring->uid, mycred->euid)) keyctl_session_to_parent()
|
H A D | process_keys.c | 837 new-> euid = old-> euid; key_change_session_keyring()
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | miscdev.c | 111 * @inode: inode of fs/ecryptfs/euid handle (ignored) 112 * @file: file for fs/ecryptfs/euid handle
|
H A D | messaging.c | 122 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { ecryptfs_find_daemon_by_euid()
|
/linux-4.1.27/fs/proc/ |
H A D | fd.c | 114 inode->i_uid = cred->euid; tid_fd_revalidate()
|
H A D | array.c | 176 from_kuid_munged(user_ns, cred->euid), task_state()
|
H A D | base.c | 531 * or euid/egid (for hide_pid_min=2)? 1482 inode->i_uid = cred->euid; proc_pid_make_inode() 1521 stat->uid = cred->euid; pid_getattr() 1563 inode->i_uid = cred->euid; pid_revalidate() 1696 inode->i_uid = cred->euid; map_files_d_revalidate()
|
/linux-4.1.27/net/core/ |
H A D | scm.c | 58 ((uid_eq(uid, cred->uid) || uid_eq(uid, cred->euid) || scm_check_creds()
|
H A D | sock.c | 1007 ucred->uid = from_kuid_munged(current_ns, cred->euid); cred_to_ucred()
|
/linux-4.1.27/security/tomoyo/ |
H A D | audit.c | 164 "uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u " tomoyo_print_header()
|
H A D | common.c | 74 [TOMOYO_TASK_EUID] = "task.euid", 930 !uid_eq(task->cred->euid, GLOBAL_ROOT_UID))) tomoyo_manager()
|
/linux-4.1.27/mm/ |
H A D | migrate.c | 1492 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE6()
|
H A D | mempolicy.c | 1388 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE4()
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | perfmon.c | 2370 DPRINT(("cur: uid=%d gid=%d task: euid=%d suid=%d uid=%d egid=%d sgid=%d\n", pfm_bad_permissions() 2373 from_kuid(&init_user_ns, tcred->euid), pfm_bad_permissions() 2379 ret = ((!uid_eq(uid, tcred->euid)) pfm_bad_permissions()
|
/linux-4.1.27/drivers/net/ |
H A D | tun.c | 421 return ((uid_valid(tun->owner) && !uid_eq(cred->euid, tun->owner)) || tun_not_capable()
|
/linux-4.1.27/fs/fuse/ |
H A D | dir.c | 1021 if (uid_eq(cred->euid, fc->user_id) && fuse_allow_current_process()
|
/linux-4.1.27/lib/ |
H A D | vsprintf.c | 1571 !uid_eq(cred->euid, cred->uid) || pointer()
|
/linux-4.1.27/kernel/sched/ |
H A D | core.c | 3394 match = (uid_eq(cred->euid, pcred->euid) || check_same_owner() 3395 uid_eq(cred->euid, pcred->uid)); check_same_owner()
|