Lines Matching defs:root
29 * If a non-root user executes a setuid-root binary in
32 * the file capabilities to be applied, and the setuid-root
43 printk(KERN_INFO "warning: `%s' has both setuid-root and"
375 uid_t root, mappedroot;
402 root = 0;
405 root = le32_to_cpu(nscap->rootid);
411 kroot = make_kuid(fs_ns, root);
413 /* If the root kuid maps to a valid uid in current ns, then return
724 * handle_privileged_root - Handle case of privileged root
727 * @effective: Do we have effective root privilege?
728 * @root_uid: This namespace' root UID WRT initial USER namespace
730 * Handle the case where root is privileged and hasn't been neutered by
732 * set UID root and nothing is changed. If we are root, cap_permitted is
733 * updated. If we have become set UID root, the effective bit is set.
745 * for a setuid root binary run by a non-root user. Do set it
746 * for a root user just to cause least surprise to an admin.
753 * To support inheritance of root-permissions and suid-root
787 * 2) we became root *OR* are were already root
788 * 3) root is supposed to have all caps (SECURE_NOROOT)
789 * Since this is just a normal root execing a process.
795 * 2) something prevented setuid root getting all caps
796 * 3) non-setuid root gets fcaps
797 * 4) non-setuid root gets ambient
800 kuid_t root, bool has_fcap)
806 (__is_eff(root, new) || __is_real(root, new)) &&
809 __is_suid(root, new) &&