/kernel/liteos_a/testsuites/unittest/security/reugid/smoke/ |
H A D | reugid_test_001.cpp | 42 int euid = 0; in Child1() local 54 ret = getresgid(reinterpret_cast<gid_t *>(&ruid), reinterpret_cast<gid_t *>(&euid), in Child1() 58 ICUNIT_ASSERT_EQUAL(euid, 300, euid); // 300: expected euid in Child1() 63 euid = geteuid(); in Child1() 64 ICUNIT_ASSERT_EQUAL(euid, 300, euid); in Child1() 66 ret = getresuid(reinterpret_cast<gid_t *>(&ruid), reinterpret_cast<gid_t *>(&euid), in Child1() 70 ICUNIT_ASSERT_EQUAL(euid, 30 in Child1() 103 int euid = 0; Child() local [all...] |
/kernel/liteos_a/syscall/ |
H A D | process_syscall.c | 543 int euid; in SysGetEffUserID() local 547 euid = OsFromKuidMunged(OsCurrentUserContainer(), CurrentCredentials()->euid); in SysGetEffUserID() 549 euid = (int)OsCurrUserGet()->effUserID; in SysGetEffUserID() 552 return euid; in SysGetEffUserID() 577 int SysGetRealEffSaveUserID(int *ruid, int *euid, int *suid) in SysGetRealEffSaveUserID() argument 587 effUserID = OsFromKuidMunged(OsCurrentUserContainer(), CurrentCredentials()->euid); in SysGetRealEffSaveUserID() 588 saveUserID = OsFromKuidMunged(OsCurrentUserContainer(), CurrentCredentials()->euid); in SysGetRealEffSaveUserID() 606 ret = LOS_ArchCopyToUser(euid, &effUserID, sizeof(int)); in SysGetRealEffSaveUserID() 655 newCredentials->euid in SysSetUserID() 711 SetRealEffSaveUserIDCheck(int ruid, int euid, int suid) SetRealEffSaveUserIDCheck() argument 729 SysSetRealEffSaveUserID(int ruid, int euid, int suid) SysSetRealEffSaveUserID() argument 764 SysSetRealEffUserID(int ruid, int euid) SysSetRealEffUserID() argument [all...] |
/kernel/linux/linux-5.10/kernel/ |
H A D | uid16.c | 48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() 50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() 60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
H A D | uid16.h | 7 long __sys_setreuid(uid_t ruid, uid_t euid); 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | sys.c | 153 * Returns true if current's euid is same as p's uid or euid, 162 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 163 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 503 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument 512 keuid = make_kuid(ns, euid); in __sys_setreuid() 516 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid() 528 !uid_eq(old->euid, kruid) && in __sys_setreuid() 533 if (euid ! in __sys_setreuid() 631 __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) __sys_setresuid() argument 710 uid_t ruid, euid, suid; SYSCALL_DEFINE3() local [all...] |
H A D | cred.c | 52 .euid = GLOBAL_ROOT_UID, 319 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 412 * ancestor of subset and set->euid is owner of subset or one in cred_cap_issubset() 417 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 459 if (!uid_eq(old->euid, new->euid) || in commit_creds() 500 !uid_eq(new->euid, old->euid) || in commit_creds() 819 from_kuid_munged(&init_user_ns, cred->euid), in dump_invalid_creds()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | uid16.c | 48 SYSCALL_DEFINE2(setreuid16, old_uid_t, ruid, old_uid_t, euid) in SYSCALL_DEFINE2() 50 return __sys_setreuid(low2highuid(ruid), low2highuid(euid)); in SYSCALL_DEFINE2() 58 SYSCALL_DEFINE3(setresuid16, old_uid_t, ruid, old_uid_t, euid, old_uid_t, suid) in SYSCALL_DEFINE3() 60 return __sys_setresuid(low2highuid(ruid), low2highuid(euid), in SYSCALL_DEFINE3() 68 old_uid_t ruid, euid, suid; in SYSCALL_DEFINE3() local 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 75 !(retval = put_user(euid, euidp))) in SYSCALL_DEFINE3()
|
H A D | uid16.h | 7 long __sys_setreuid(uid_t ruid, uid_t euid); 9 long __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid);
|
H A D | sys.c | 173 * Returns true if current's euid is same as p's uid or euid, 182 if (uid_eq(pcred->uid, cred->euid) || in set_one_prio_perm() 183 uid_eq(pcred->euid, cred->euid)) in set_one_prio_perm() 529 long __sys_setreuid(uid_t ruid, uid_t euid) in __sys_setreuid() argument 538 keuid = make_kuid(ns, euid); in __sys_setreuid() 542 if ((euid != (uid_t) -1) && !uid_valid(keuid)) in __sys_setreuid() 554 !uid_eq(old->euid, kruid) && in __sys_setreuid() 559 if (euid ! in __sys_setreuid() 667 __sys_setresuid(uid_t ruid, uid_t euid, uid_t suid) __sys_setresuid() argument 751 uid_t ruid, euid, suid; SYSCALL_DEFINE3() local [all...] |
H A D | cred.c | 51 .euid = GLOBAL_ROOT_UID, 271 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 363 * ancestor of subset and set->euid is owner of subset or one in cred_cap_issubset() 368 uid_eq(subset_ns->owner, set->euid)) in cred_cap_issubset() 404 if (!uid_eq(old->euid, new->euid) || in commit_creds() 443 !uid_eq(new->euid, old->euid) || in commit_creds()
|
/kernel/linux/linux-5.10/mm/ |
H A D | purgeable_ashmem_trigger.c | 55 if (!uid_eq(cred->euid, GLOBAL_MEMMGR_UID) && in purgeable_ashmem_trigger_write() 56 !uid_eq(cred->euid, GLOBAL_ROOT_UID)) { in purgeable_ashmem_trigger_write() 81 if (!uid_eq(cred->euid, GLOBAL_MEMMGR_UID) && in purgeable_ashmem_trigger_show() 82 !uid_eq(cred->euid, GLOBAL_ROOT_UID)) { in purgeable_ashmem_trigger_show()
|
/kernel/linux/linux-6.6/mm/ |
H A D | purgeable_ashmem_trigger.c | 55 if (!uid_eq(cred->euid, GLOBAL_MEMMGR_UID) && in purgeable_ashmem_trigger_write() 56 !uid_eq(cred->euid, GLOBAL_ROOT_UID)) { in purgeable_ashmem_trigger_write() 81 if (!uid_eq(cred->euid, GLOBAL_MEMMGR_UID) && in purgeable_ashmem_trigger_show() 82 !uid_eq(cred->euid, GLOBAL_ROOT_UID)) { in purgeable_ashmem_trigger_show()
|
/kernel/linux/common_modules/container_escape_detection/include/ |
H A D | ced_detection_points.h | 20 uid_t euid; member 28 info->euid = cred->euid.val; in cred_info_record()
|
/kernel/linux/linux-5.10/ipc/ |
H A D | util.c | 279 kuid_t euid; in ipc_addid() local 298 current_euid_egid(&euid, &egid); in ipc_addid() 299 new->cuid = new->uid = euid; in ipc_addid() 521 kuid_t euid = current_euid(); in ipcperms() local 527 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 528 uid_eq(euid, ipcp->uid)) in ipcperms() 692 kuid_t euid; in ipcctl_obtain_check() local 707 euid = current_euid(); in ipcctl_obtain_check() 708 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipc in ipcctl_obtain_check() [all...] |
/kernel/linux/linux-6.6/ipc/ |
H A D | util.c | 280 kuid_t euid; in ipc_addid() local 299 current_euid_egid(&euid, &egid); in ipc_addid() 300 new->cuid = new->uid = euid; in ipc_addid() 555 kuid_t euid = current_euid(); in ipcperms() local 561 if (uid_eq(euid, ipcp->cuid) || in ipcperms() 562 uid_eq(euid, ipcp->uid)) in ipcperms() 726 kuid_t euid; in ipcctl_obtain_check() local 741 euid = current_euid(); in ipcctl_obtain_check() 742 if (uid_eq(euid, ipcp->cuid) || uid_eq(euid, ipc in ipcctl_obtain_check() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | reuseaddr_ports_exhausted.c | 130 uid_t euid[2] = {10, 20}; in TEST() local 136 ret = seteuid(euid[j]); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST() 146 EXPECT_NE(-1, fd[1]) TH_LOG("should succeed to bind because one socket can be bound in each euid."); in TEST()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | reuseaddr_ports_exhausted.c | 130 uid_t euid[2] = {10, 20}; in TEST() local 136 ret = seteuid(euid[j]); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST() 146 EXPECT_NE(-1, fd[1]) TH_LOG("should succeed to bind because one socket can be bound in each euid."); in TEST()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | cred.h | 124 kuid_t euid; /* effective UID of the task */ member 147 struct group_info *group_info; /* supplementary groups for euid/fsgid */ 372 #define task_euid(task) (task_cred_xxx((task), euid)) 381 #define current_euid() (current_cred_xxx(euid)) 413 *(_euid) = __cred->euid; \
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | cred.h | 116 kuid_t euid; /* effective UID of the task */ member 140 struct group_info *group_info; /* supplementary groups for euid/fsgid */ 322 #define task_euid(task) (task_cred_xxx((task), euid)) 332 #define current_euid() (current_cred_xxx(euid)) 365 *(_euid) = __cred->euid; \
|
/kernel/linux/linux-5.10/security/ |
H A D | commoncap.c | 90 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 718 { return uid_eq(cred->euid, uid); } in __is_eff() 777 { return !uid_eq(new->euid, old->uid); } in __is_setuid() 867 new->euid = new->uid; in cap_bprm_creds_from_file() 874 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 999 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective 1002 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective 1025 uid_eq(old->euid, root_ui in cap_emulate_setxuid() [all...] |
/kernel/linux/linux-6.6/security/ |
H A D | commoncap.c | 91 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 771 { return uid_eq(cred->euid, uid); } in __is_eff() 830 { return !uid_eq(new->euid, old->uid); } in __is_setuid() 922 new->euid = new->uid; in cap_bprm_creds_from_file() 929 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1063 * 2) When set*uiding _from_ euid == 0 _to_ euid != 0, the effective 1066 * 3) When set*uiding _from_ euid != 0 _to_ euid == 0, the effective 1089 uid_eq(old->euid, root_ui in cap_emulate_setxuid() [all...] |
/kernel/linux/linux-5.10/arch/mips/kernel/ |
H A D | mips-mt-fpaff.c | 56 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 57 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | compat_linux.h | 96 long compat_sys_s390_setreuid16(u16 ruid, u16 euid); 98 long compat_sys_s390_setresuid16(u16 ruid, u16 euid, u16 suid); 99 long compat_sys_s390_getresuid16(u16 __user *ruid, u16 __user *euid, u16 __user *suid);
|
/kernel/linux/linux-6.6/arch/mips/kernel/ |
H A D | mips-mt-fpaff.c | 56 match = (uid_eq(cred->euid, pcred->euid) || in check_same_owner() 57 uid_eq(cred->euid, pcred->uid)); in check_same_owner()
|
/kernel/linux/linux-5.10/security/safesetid/ |
H A D | lsm.c | 162 if (uid_eq(new_id.uid, old->uid) || uid_eq(new_id.uid, old->euid) || in id_permitted_for_cred() 182 __kuid_val(old->uid), __kuid_val(old->euid), in id_permitted_for_cred() 209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid()
|