/linux-4.4.14/kernel/ |
D | uid16.c | 44 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() argument 46 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 54 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() argument 56 return sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 64 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 67 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 71 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
D | sys.c | 139 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 140 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 462 SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid) in SYSCALL_DEFINE2() argument 471 keuid = make_kuid(ns, euid); in SYSCALL_DEFINE2() 475 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in SYSCALL_DEFINE2() 487 !uid_eq(old->euid, kruid) && in SYSCALL_DEFINE2() 492 if (euid != (uid_t) -1) { in SYSCALL_DEFINE2() 493 new->euid = keuid; in SYSCALL_DEFINE2() 495 !uid_eq(old->euid, keuid) && in SYSCALL_DEFINE2() 507 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid))) in SYSCALL_DEFINE2() [all …]
|
D | cred.c | 53 .euid = GLOBAL_ROOT_UID, 401 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 442 if (!uid_eq(old->euid, new->euid) || in commit_creds() 474 !uid_eq(new->euid, old->euid) || in commit_creds() 739 from_kuid_munged(&init_user_ns, cred->euid), in dump_invalid_creds()
|
D | user_namespace.c | 63 kuid_t owner = new->euid; in create_user_ns() 825 uid_eq(ns->owner, cred->euid)) { in new_idmap_permitted() 829 if (uid_eq(uid, cred->euid)) in new_idmap_permitted()
|
D | audit.h | 138 kuid_t uid, euid, suid, fsuid; member
|
D | auditsc.c | 371 return audit_compare_uid(cred->euid, name, f, ctx); in audit_field_compare() 388 return audit_uid_comparator(cred->uid, f->op, cred->euid); in audit_field_compare() 395 return audit_uid_comparator(tsk->loginuid, f->op, cred->euid); in audit_field_compare() 402 return audit_uid_comparator(cred->euid, f->op, cred->suid); in audit_field_compare() 404 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); in audit_field_compare() 476 result = audit_uid_comparator(cred->euid, f->op, f->uid); in audit_filter_rules()
|
D | signal.c | 697 if (uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 698 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred() 1323 if (!uid_eq(cred->euid, pcred->suid) && !uid_eq(cred->euid, pcred->uid) && in kill_as_cred_perm()
|
D | ptrace.c | 260 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access()
|
D | cgroup.c | 2686 if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) && in cgroup_procs_write_permission() 2687 !uid_eq(cred->euid, tcred->uid) && in cgroup_procs_write_permission() 2688 !uid_eq(cred->euid, tcred->suid)) in cgroup_procs_write_permission()
|
D | audit.c | 1903 from_kuid(&init_user_ns, cred->euid), in audit_log_task_info()
|
/linux-4.4.14/security/ |
D | commoncap.c | 93 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 513 if (has_cap && !uid_eq(new->uid, root_uid) && uid_eq(new->euid, root_uid)) { in cap_bprm_set_creds() 524 if (uid_eq(new->euid, root_uid) || uid_eq(new->uid, root_uid)) { in cap_bprm_set_creds() 529 if (uid_eq(new->euid, root_uid)) in cap_bprm_set_creds() 544 is_setid = !uid_eq(new->euid, old->uid) || !gid_eq(new->egid, old->gid); in cap_bprm_set_creds() 552 new->euid = new->uid; in cap_bprm_set_creds() 559 new->suid = new->fsuid = new->euid; in cap_bprm_set_creds() 600 !uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) || in cap_bprm_set_creds() 638 return (!uid_eq(cred->euid, cred->uid) || in cap_bprm_secureexec() 732 uid_eq(old->euid, root_uid) || in cap_emulate_setxuid() [all …]
|
/linux-4.4.14/ipc/ |
D | util.c | 222 kuid_t euid; in ipc_addid() local 240 current_euid_egid(&euid, &egid); in ipc_addid() 241 new->cuid = new->uid = euid; in ipc_addid() 486 kuid_t euid = current_euid(); in ipcperms() local 492 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 493 uid_eq(euid, ipcp->uid)) in ipcperms() 691 kuid_t euid; in ipcctl_pre_down_nolock() local 706 euid = current_euid(); in ipcctl_pre_down_nolock() 707 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipcp->uid) || in ipcctl_pre_down_nolock()
|
D | shm.c | 1028 kuid_t euid = current_euid(); in SYSCALL_DEFINE3() local 1029 if (!uid_eq(euid, shp->shm_perm.uid) && in SYSCALL_DEFINE3() 1030 !uid_eq(euid, shp->shm_perm.cuid)) { in SYSCALL_DEFINE3()
|
/linux-4.4.14/arch/mips/kernel/ |
D | mips-mt-fpaff.c | 53 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 54 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/linux-4.4.14/include/linux/ |
D | cred.h | 131 kuid_t euid; /* effective UID of the task */ member 357 #define task_euid(task) (task_cred_xxx((task), euid)) 366 #define current_euid() (current_cred_xxx(euid)) 396 *(_euid) = __cred->euid; \
|
D | syscalls.h | 229 asmlinkage long sys_getresuid(uid_t __user *ruid, uid_t __user *euid, uid_t __user *suid); 238 asmlinkage long sys_setreuid(uid_t ruid, uid_t euid); 240 asmlinkage long sys_setresuid(uid_t ruid, uid_t euid, uid_t suid); 535 asmlinkage long sys_setreuid16(old_uid_t ruid, old_uid_t euid); 537 asmlinkage long sys_setresuid16(old_uid_t ruid, old_uid_t euid, old_uid_t suid); 539 old_uid_t __user *euid, old_uid_t __user *suid);
|
D | fs.h | 812 kuid_t uid, euid; /* uid/euid of process setting the owner */ member
|
/linux-4.4.14/arch/s390/kernel/ |
D | compat_linux.c | 116 COMPAT_SYSCALL_DEFINE2(s390_setreuid16, u16, ruid, u16, euid) in COMPAT_SYSCALL_DEFINE2() argument 118 return sys_setreuid(low2highuid(ruid), low2highuid(euid)); in COMPAT_SYSCALL_DEFINE2() 126 COMPAT_SYSCALL_DEFINE3(s390_setresuid16, u16, ruid, u16, euid, u16, suid) in COMPAT_SYSCALL_DEFINE3() argument 128 return sys_setresuid(low2highuid(ruid), low2highuid(euid), in COMPAT_SYSCALL_DEFINE3() 137 u16 ruid, euid, suid; in COMPAT_SYSCALL_DEFINE3() local 140 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in COMPAT_SYSCALL_DEFINE3() 144 !(retval = put_user(euid, euidp))) in COMPAT_SYSCALL_DEFINE3()
|
D | compat_linux.h | 95 long compat_sys_s390_setreuid16(u16 ruid, u16 euid); 97 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 98 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
D | compat_wrapper.c | 113 COMPAT_SYSCALL_WRAP3(getresuid, uid_t __user *, ruid, uid_t __user *, euid, uid_t __user *, suid);
|
/linux-4.4.14/fs/ |
D | fcntl.c | 95 filp->f_owner.euid = cred->euid; in f_modown() 228 src[1] = from_kuid(user_ns, filp->f_owner.euid); in f_getowner_uids() 440 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || in sigio_perm() 441 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm()
|
D | exec.c | 1295 bprm->cred->euid = current_euid(); in bprm_fill_uid() 1325 bprm->cred->euid = uid; in bprm_fill_uid()
|
D | binfmt_elf_fdpic.c | 648 NEW_AUX_ENT(AT_EUID, (elf_addr_t) from_kuid_munged(cred->user_ns, cred->euid)); in create_elf_fdpic_tables()
|
D | binfmt_elf.c | 245 NEW_AUX_ENT(AT_EUID, from_kuid_munged(cred->user_ns, cred->euid)); in create_elf_tables()
|
/linux-4.4.14/arch/cris/include/asm/ |
D | eshlibld.h | 78 int euid, int is_suid);
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | ima_policy | 23 [euid=] [fowner=]] 35 euid:= decimal value
|
/linux-4.4.14/arch/alpha/kernel/ |
D | asm-offsets.c | 29 DEFINE(CRED_EUID, offsetof(struct cred, euid)); in foo()
|
/linux-4.4.14/include/uapi/linux/ |
D | cn_proc.h | 92 __u32 euid; member
|
/linux-4.4.14/security/keys/ |
D | keyctl.c | 1514 if (!uid_eq(pcred->uid, mycred->euid) || in keyctl_session_to_parent() 1515 !uid_eq(pcred->euid, mycred->euid) || in keyctl_session_to_parent() 1516 !uid_eq(pcred->suid, mycred->euid) || in keyctl_session_to_parent() 1524 !uid_eq(pcred->session_keyring->uid, mycred->euid)) || in keyctl_session_to_parent() 1525 !uid_eq(mycred->session_keyring->uid, mycred->euid)) in keyctl_session_to_parent()
|
D | process_keys.c | 837 new-> euid = old-> euid; in key_change_session_keyring()
|
/linux-4.4.14/drivers/connector/ |
D | cn_proc.c | 144 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); in proc_id_connector()
|
/linux-4.4.14/block/ |
D | ioprio.c | 40 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio()
|
/linux-4.4.14/fs/proc/ |
D | fd.c | 114 inode->i_uid = cred->euid; in tid_fd_revalidate()
|
D | base.c | 1670 inode->i_uid = cred->euid; in proc_pid_make_inode() 1709 stat->uid = cred->euid; in pid_getattr() 1751 inode->i_uid = cred->euid; in pid_revalidate() 1877 inode->i_uid = cred->euid; in map_files_d_revalidate()
|
D | array.c | 184 from_kuid_munged(user_ns, cred->euid), in task_state()
|
/linux-4.4.14/net/core/ |
D | scm.c | 58 ((uid_eq(uid, cred->uid) || uid_eq(uid, cred->euid) || in scm_check_creds()
|
D | sock.c | 1024 ucred->uid = from_kuid_munged(current_ns, cred->euid); in cred_to_ucred()
|
/linux-4.4.14/fs/ecryptfs/ |
D | messaging.c | 122 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
|
/linux-4.4.14/security/integrity/ima/ |
D | ima_policy.c | 237 if (!uid_eq(rule->uid, cred->euid) in ima_match_rules() 241 } else if (!uid_eq(rule->uid, cred->euid)) in ima_match_rules()
|
/linux-4.4.14/mm/ |
D | migrate.c | 1513 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && in SYSCALL_DEFINE6()
|
D | mempolicy.c | 1385 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && in SYSCALL_DEFINE4()
|
/linux-4.4.14/kernel/sched/ |
D | core.c | 3765 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 3766 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/linux-4.4.14/Documentation/security/ |
D | credentials.txt | 432 __task_cred(task)->euid
|
/linux-4.4.14/lib/ |
D | vsprintf.c | 1574 !uid_eq(cred->euid, cred->uid) || in pointer()
|
/linux-4.4.14/drivers/net/ |
D | tun.c | 475 return ((uid_valid(tun->owner) && !uid_eq(cred->euid, tun->owner)) || in tun_not_capable()
|
/linux-4.4.14/security/tomoyo/ |
D | common.c | 930 !uid_eq(task->cred->euid, GLOBAL_ROOT_UID))) in tomoyo_manager()
|
/linux-4.4.14/fs/fuse/ |
D | dir.c | 1021 if (uid_eq(cred->euid, fc->user_id) && in fuse_allow_current_process()
|
/linux-4.4.14/arch/ia64/kernel/ |
D | perfmon.c | 2373 from_kuid(&init_user_ns, tcred->euid), in pfm_bad_permissions() 2379 ret = ((!uid_eq(uid, tcred->euid)) in pfm_bad_permissions()
|
/linux-4.4.14/Documentation/ |
D | kernel-parameters.txt | 1470 effective uid (euid=0) or uid=0.
|