/linux/fs/nfsd/ |
H A D | auth.c | 35 new->fsuid = cred->cr_uid; in nfsd_setuser() 41 new->fsuid = exp->ex_anon_uid; in nfsd_setuser() 47 if (uid_eq(new->fsuid, GLOBAL_ROOT_UID)) in nfsd_setuser() 48 new->fsuid = exp->ex_anon_uid; in nfsd_setuser() 69 if (uid_eq(new->fsuid, INVALID_UID)) in nfsd_setuser() 70 new->fsuid = exp->ex_anon_uid; in nfsd_setuser() 77 if (!uid_eq(new->fsuid, GLOBAL_ROOT_UID)) in nfsd_setuser()
|
H A D | filecache.c | 84 if (!uid_eq(c1->fsuid, c2->fsuid)) in nfsd_match_cred()
|
/linux/kernel/ |
H A D | cred.c | 52 .fsuid = GLOBAL_ROOT_UID, 275 new->suid = new->fsuid = new->euid; in prepare_exec_creds() 408 !uid_eq(old->fsuid, new->fsuid) || in commit_creds() 427 if (!uid_eq(new->fsuid, old->fsuid)) in commit_creds() 447 !uid_eq(new->fsuid, old->fsuid)) in commit_creds() 485 * fsuid, fsgid, and supplementary groups. That is, if they will both 500 if (uid_lt(a->fsuid, in cred_fscmp() [all...] |
H A D | auditsc.c | 403 return audit_compare_uid(cred->fsuid, name, f, ctx); in audit_field_compare() 415 return audit_uid_comparator(cred->uid, f->op, cred->fsuid); in audit_field_compare() 425 cred->fsuid); in audit_field_compare() 430 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); in audit_field_compare() 433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); in audit_field_compare() 514 result = audit_uid_comparator(cred->fsuid, f->op, f->uid); in audit_filter_rules() 1015 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); in audit_reset_context() 1658 " fsuid=%u egid=%u sgid=%u fsgid=%u", in audit_log_uring() 1665 from_kuid(&init_user_ns, cred->fsuid), in audit_log_uring()
|
H A D | audit.h | 138 kuid_t uid, euid, suid, fsuid; member
|
/linux/net/sunrpc/ |
H A D | auth_unix.c | 88 if (!uid_eq(cred->cr_cred->fsuid, acred->cred->fsuid) || !gid_eq(cred->cr_cred->fsgid, acred->cred->fsgid)) in unx_match() 135 *p++ = cpu_to_be32(from_kuid_munged(userns, cred->cr_cred->fsuid)); in unx_marshal()
|
H A D | svcauth.c | 195 svc->cr_uid = KUIDT_INIT(from_kuid_munged(userns, cred->fsuid)); in svcauth_map_clnt_to_svc_cred_local()
|
/linux/net/netfilter/ |
H A D | xt_owner.c | 90 if ((uid_gte(filp->f_cred->fsuid, uid_min) && in owner_mt() 91 uid_lte(filp->f_cred->fsuid, uid_max)) ^ in owner_mt()
|
/linux/include/uapi/linux/ |
H A D | pidfd.h | 91 __u32 fsuid; member
|
/linux/security/keys/ |
H A D | permission.c | 54 if (uid_eq(key->uid, cred->fsuid)) { in key_task_permission()
|
H A D | request_key.c | 140 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, in call_sbin_request_key() 155 sprintf(uid_str, "%d", from_kuid(&init_user_ns, cred->fsuid)); in call_sbin_request_key() 396 ctx->cred->fsuid, ctx->cred->fsgid, ctx->cred, in construct_alloc_key()
|
H A D | process_keys.c | 375 * Handle the fsuid changing. 382 new_cred->thread_keyring->uid = new_cred->fsuid; in key_fsuid_changed() 931 new->fsuid = old->fsuid; in key_change_session_keyring()
|
H A D | request_key_auth.c | 217 cred->fsuid, cred->fsgid, cred, in request_key_auth_new()
|
/linux/fs/orangefs/ |
H A D | xattr.c | 101 int fsuid; in orangefs_inode_getxattr() local 114 fsuid = from_kuid(&init_user_ns, current_fsuid()); in orangefs_inode_getxattr() 122 fsuid, in orangefs_inode_getxattr()
|
/linux/security/ |
H A D | commoncap.c | 953 new->suid = new->fsuid = new->euid; in cap_bprm_creds_from_file() 1095 * fsuid is handled elsewhere. fsuid == 0 and {r,e,s}uid!= 0 should 1170 if (uid_eq(old->fsuid, root_uid) && !uid_eq(new->fsuid, root_uid)) in cap_task_fix_setuid() 1174 if (!uid_eq(old->fsuid, root_uid) && uid_eq(new->fsuid, root_uid)) in cap_task_fix_setuid()
|
/linux/security/apparmor/ |
H A D | file.c | 49 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb() local 63 audit_log_format(ab, " fsuid=%d", in file_audit_cb() 64 from_kuid(&init_user_ns, fsuid)); in file_audit_cb()
|
/linux/tools/testing/selftests/pidfd/ |
H A D | pidfd.h | 183 __u32 fsuid; member
|
/linux/security/safesetid/ |
H A D | lsm.c | 203 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID)) in safesetid_task_fix_setuid()
|
/linux/fs/smb/server/ |
H A D | smb_common.c | 761 cred->fsuid = make_kuid(&init_user_ns, uid); in __ksmbd_override_fsids() 779 if (!uid_eq(cred->fsuid, GLOBAL_ROOT_UID)) in __ksmbd_override_fsids()
|
/linux/Documentation/translations/zh_CN/security/ |
H A D | credentials.rst | 460 ``file->f_uid`` 和 ``file->f_gid`` 的代码现在应访问 ``file->f_cred->fsuid``
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 338 type=1300 audit(1653364370.067:61): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=7f1105a28000 a1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="ld-linux.so" exe="/tmp/ipe-test/lib/ld-linux.so" subj=unconfined key=(null) 342 type=1300 audit(1653364735.161:64): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="mmap_test" exe="/root/overlake_test/upstream_test/vol_fsverity/bin/mmap_test" subj=unconfined key=(null) 383 type=1300 audit(1653425583.136:54): SYSCALL arch=c000003e syscall=1 success=yes exit=2 a0=3 a1=5596fcae1fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null) 427 type=1300 audit(1653425529.927:53): arch=c000003e syscall=1 success=yes exit=2567 a0=3 a1=5596fcae1fb0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null) 492 type=1300 audit(1653425689.008:55): arch=c000003e syscall=1 success=yes exit=2 a0=1 a1=55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=) 496 type=1300 audit(1653425689.008:55): arch=c000003e syscall=1 success=yes exit=2 a0=1 a1=55c1065e5c60 a2=2 a3=0 items=0 ppid=405 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=)
|
/linux/fs/ |
H A D | pidfs.c | 374 kinfo.fsuid = from_kuid_munged(user_ns, c->fsuid); in pidfd_info()
|
/linux/fs/nfs/ |
H A D | dir.c | 2971 if (uid_lt(a->fsuid, b->fsuid)) in access_cmp() 2973 if (uid_gt(a->fsuid, b->fsuid)) in access_cmp() 3178 cache->fsuid = cred->fsuid; in nfs_access_add_cache()
|
/linux/fs/smb/client/ |
H A D | connect.c | 4370 cifs_construct_tcon(struct cifs_sb_info *cifs_sb, kuid_t fsuid) in cifs_construct_tcon() argument 4384 ctx->linux_uid = fsuid; in cifs_construct_tcon() 4385 ctx->cred_uid = fsuid; in cifs_construct_tcon() 4539 kuid_t fsuid = current_fsuid(); in cifs_sb_tlink() local 4546 tlink = tlink_rb_search(&cifs_sb->tlink_tree, fsuid); in cifs_sb_tlink() 4555 newtlink->tl_uid = fsuid; in cifs_sb_tlink() 4563 tlink = tlink_rb_search(&cifs_sb->tlink_tree, fsuid); in cifs_sb_tlink() 4597 tlink->tl_tcon = cifs_construct_tcon(cifs_sb, fsuid); in cifs_sb_tlink()
|
/linux/include/linux/ |
H A D | nfs_fs.h | 63 kuid_t fsuid; member
|