kernel: disable setuid debug log
This commit is contained in:
@@ -577,7 +577,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
|||||||
|
|
||||||
kuid_t new_uid = new->uid;
|
kuid_t new_uid = new->uid;
|
||||||
kuid_t old_uid = old->uid;
|
kuid_t old_uid = old->uid;
|
||||||
pr_info("handle_setuid from %d to %d\n", old_uid.val, new_uid.val);
|
// pr_info("handle_setuid from %d to %d\n", old_uid.val, new_uid.val);
|
||||||
|
|
||||||
if (0 != old_uid.val) {
|
if (0 != old_uid.val) {
|
||||||
// old process is not root, ignore it.
|
// old process is not root, ignore it.
|
||||||
@@ -585,7 +585,7 @@ int ksu_handle_setuid(struct cred *new, const struct cred *old)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!is_appuid(new_uid) || is_unsupported_uid(new_uid.val)) {
|
if (!is_appuid(new_uid) || is_unsupported_uid(new_uid.val)) {
|
||||||
pr_info("handle setuid ignore non application or isolated uid: %d\n", new_uid.val);
|
// pr_info("handle setuid ignore non application or isolated uid: %d\n", new_uid.val);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user