/linux-master/fs/nfsd/ |
H A D | auth.c | 35 new->fsuid = rqstp->rq_cred.cr_uid; 41 new->fsuid = exp->ex_anon_uid; 47 if (uid_eq(new->fsuid, GLOBAL_ROOT_UID)) 48 new->fsuid = exp->ex_anon_uid; 69 if (uid_eq(new->fsuid, INVALID_UID)) 70 new->fsuid = exp->ex_anon_uid; 77 if (!uid_eq(new->fsuid, GLOBAL_ROOT_UID))
|
H A D | filecache.c | 82 if (!uid_eq(c1->fsuid, c2->fsuid))
|
/linux-master/kernel/ |
H A D | cred.c | 52 .fsuid = GLOBAL_ROOT_UID, 275 new->suid = new->fsuid = new->euid; 408 !uid_eq(old->fsuid, new->fsuid) || 427 if (!uid_eq(new->fsuid, old->fsuid)) 447 !uid_eq(new->fsuid, old->fsuid)) 535 * fsuid, fsgid, and supplementary groups. That is, if they will both 550 if (uid_lt(a->fsuid, [all...] |
H A D | audit.h | 137 kuid_t uid, euid, suid, fsuid; member in struct:audit_context
|
H A D | auditsc.c | 403 return audit_compare_uid(cred->fsuid, name, f, ctx); 415 return audit_uid_comparator(cred->uid, f->op, cred->fsuid); 425 cred->fsuid); 430 return audit_uid_comparator(cred->euid, f->op, cred->fsuid); 433 return audit_uid_comparator(cred->suid, f->op, cred->fsuid); 514 result = audit_uid_comparator(cred->fsuid, f->op, f->uid); 1013 ctx->uid = ctx->euid = ctx->suid = ctx->fsuid = KUIDT_INIT(0); 1662 " fsuid=%u egid=%u sgid=%u fsgid=%u", 1669 from_kuid(&init_user_ns, cred->fsuid),
|
H A D | sys.c | 576 new->fsuid = new->euid; 639 new->fsuid = new->euid = kuid; 694 uid_eq(keuid, old->fsuid))) && 724 new->fsuid = new->euid; 858 * "setfsuid()" sets the fsuid - the uid used for filesystem checks. This 871 old_fsuid = from_kuid_munged(old->user_ns, old->fsuid); 882 uid_eq(kuid, old->suid) || uid_eq(kuid, old->fsuid) || 884 if (!uid_eq(kuid, old->fsuid)) { 885 new->fsuid = kuid;
|
/linux-master/security/keys/ |
H A D | permission.c | 54 if (uid_eq(key->uid, cred->fsuid)) {
|
H A D | process_keys.c | 375 * Handle the fsuid changing. 382 new_cred->thread_keyring->uid = new_cred->fsuid; 931 new->fsuid = old->fsuid;
|
H A D | request_key.c | 140 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, 155 sprintf(uid_str, "%d", from_kuid(&init_user_ns, cred->fsuid)); 396 ctx->cred->fsuid, ctx->cred->fsgid, ctx->cred,
|
H A D | request_key_auth.c | 217 cred->fsuid, cred->fsgid, cred,
|
/linux-master/net/netfilter/ |
H A D | xt_owner.c | 90 if ((uid_gte(filp->f_cred->fsuid, uid_min) && 91 uid_lte(filp->f_cred->fsuid, uid_max)) ^
|
/linux-master/net/sunrpc/ |
H A D | auth_unix.c | 88 if (!uid_eq(cred->cr_cred->fsuid, acred->cred->fsuid) || !gid_eq(cred->cr_cred->fsgid, acred->cred->fsgid)) 135 *p++ = cpu_to_be32(from_kuid_munged(userns, cred->cr_cred->fsuid));
|
/linux-master/include/linux/ |
H A D | cred.h | 119 kuid_t fsuid; /* UID for VFS ops */ member in struct:cred 378 #define current_fsuid() (current_cred_xxx(fsuid)) 415 *(_fsuid) = __cred->fsuid; \
|
H A D | nfs_fs.h | 63 kuid_t fsuid; member in struct:nfs_access_entry
|
/linux-master/fs/orangefs/ |
H A D | xattr.c | 101 int fsuid; local 114 fsuid = from_kuid(&init_user_ns, current_fsuid()); 122 fsuid,
|
/linux-master/security/ |
H A D | commoncap.c | 930 new->suid = new->fsuid = new->euid; 1070 * fsuid is handled elsewhere. fsuid == 0 and {r,e,s}uid!= 0 should 1145 if (uid_eq(old->fsuid, root_uid) && !uid_eq(new->fsuid, root_uid)) 1149 if (!uid_eq(old->fsuid, root_uid) && uid_eq(new->fsuid, root_uid))
|
/linux-master/security/apparmor/ |
H A D | file.c | 48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); local 62 audit_log_format(ab, " fsuid=%d", 63 from_kuid(&init_user_ns, fsuid));
|
/linux-master/security/safesetid/ |
H A D | lsm.c | 203 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID))
|
/linux-master/fs/smb/server/ |
H A D | smb_common.c | 755 cred->fsuid = make_kuid(&init_user_ns, uid); 766 if (!uid_eq(cred->fsuid, GLOBAL_ROOT_UID))
|
/linux-master/fs/coda/ |
H A D | file.c | 272 coda_flags, coda_file->f_cred->fsuid);
|
/linux-master/io_uring/ |
H A D | fdinfo.c | 31 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
|
/linux-master/fs/smb/client/ |
H A D | connect.c | 4004 __cifs_construct_tcon(struct cifs_sb_info *cifs_sb, kuid_t fsuid) argument 4018 ctx->linux_uid = fsuid; 4019 ctx->cred_uid = fsuid; 4103 cifs_construct_tcon(struct cifs_sb_info *cifs_sb, kuid_t fsuid) argument 4108 ret = __cifs_construct_tcon(cifs_sb, fsuid); 4161 * Find or construct an appropriate tcon given a cifs_sb and the fsuid of the 4167 * First, search the rbtree for an existing tcon for this fsuid. If one 4180 kuid_t fsuid = current_fsuid(); local 4187 tlink = tlink_rb_search(&cifs_sb->tlink_tree, fsuid); 4196 newtlink->tl_uid = fsuid; [all...] |
/linux-master/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 567 kuid_t uid = cred->cr_cred->fsuid; 636 cred->cr_cred->fsuid), err); 701 cred->cr_cred->fsuid), err); 1369 return hash_64(from_kuid(&init_user_ns, acred->cred->fsuid), hashbits); 1523 ret = uid_eq(rc->cr_cred->fsuid, acred->cred->fsuid);
|
/linux-master/tools/testing/selftests/filesystems/binderfs/ |
H A D | binderfs_test.c | 12 #include <sys/fsuid.h>
|
/linux-master/fs/ |
H A D | open.c | 376 * switching the fsuid/fsgid around to the real ones. 389 if (!uid_eq(cred->fsuid, cred->uid) || 423 override_cred->fsuid = override_cred->uid;
|