Home
last modified time | relevance | path

Searched refs:user (Results 1 – 19 of 19) sorted by relevance

/security/keys/
A Dkey.c79 user = NULL; in key_user_lookup()
104 user = candidate; in key_user_lookup()
113 return user; in key_user_lookup()
125 kfree(user); in key_user_put()
252 if (!user) in key_alloc()
267 user->qnbytes + quotalen < user->qnbytes) in key_alloc()
271 user->qnkeys++; in key_alloc()
291 key->user = user; in key_alloc()
333 user->qnkeys--; in key_alloc()
346 user->qnkeys--; in key_alloc()
[all …]
A Dproc.c71 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next()
103 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key()
256 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next()
307 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
309 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
313 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show()
314 refcount_read(&user->usage), in proc_key_users_show()
315 atomic_read(&user->nkeys), in proc_key_users_show()
316 atomic_read(&user->nikeys), in proc_key_users_show()
317 user->qnkeys, in proc_key_users_show()
[all …]
A Drequest_key.c372 struct key_user *user, in construct_alloc_key() argument
385 mutex_lock(&user->cons_lock); in construct_alloc_key()
437 mutex_unlock(&user->cons_lock); in construct_alloc_key()
459 mutex_unlock(&user->cons_lock); in construct_alloc_key()
465 mutex_unlock(&user->cons_lock); in construct_alloc_key()
475 mutex_unlock(&user->cons_lock); in construct_alloc_key()
481 mutex_unlock(&user->cons_lock); in construct_alloc_key()
496 struct key_user *user; in construct_key_and_link() local
509 user = key_user_lookup(current_fsuid()); in construct_key_and_link()
510 if (!user) { in construct_key_and_link()
[all …]
A Dkeyctl.c959 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key()
962 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key()
968 if (user == (uid_t) -1 && group == (gid_t) -1) in keyctl_chown_key()
988 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key()
1025 spin_lock_irqsave(&key->user->lock, flags); in keyctl_chown_key()
1026 key->user->qnkeys--; in keyctl_chown_key()
1027 key->user->qnbytes -= key->quotalen; in keyctl_chown_key()
1031 atomic_dec(&key->user->nkeys); in keyctl_chown_key()
1035 atomic_dec(&key->user->nikeys); in keyctl_chown_key()
1039 zapowner = key->user; in keyctl_chown_key()
[all …]
A Dgc.c158 atomic_dec(&key->user->nkeys); in key_gc_unused_keys()
160 atomic_dec(&key->user->nikeys); in key_gc_unused_keys()
162 key_user_put(key->user); in key_gc_unused_keys()
A DKconfig51 A particular keyring may be accessed by either the user whose keyring
100 key can be either a trusted-key or user-key type. Only encrypted
106 bool "Allow encrypted keys with user decrypted data"
110 user-provided decrypted data. The decrypted data must be hex-ascii
A Dprocess_keys.c82 uid_t uid = from_kuid(user_ns, cred->user->uid); in look_up_user_keyrings()
106 uid_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID, in look_up_user_keyrings()
128 session_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID, in look_up_user_keyrings()
206 cred->user->uid)); in get_user_session_keyring_rcu()
936 new->user = get_uid(old->user); in key_change_session_keyring()
A Dinternal.h71 extern void key_user_put(struct key_user *user);
A Dkeyring.c1158 if (!kuid_has_mapping(ns, keyring->user->uid)) in find_keyring_by_name()
/security/selinux/ss/
A Dcontext.h29 u32 user; member
160 dst->user = src->user; in context_cpy()
184 c->user = c->role = c->type = 0; in context_destroy()
198 return ((c1->user == c2->user) && (c1->role == c2->role) && in context_equal()
A Dmls.c205 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid()
207 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid()
396 struct user_datum *user, struct context *usercon) in mls_setup_user_range() argument
401 struct mls_level *user_low = &(user->range.level[0]); in mls_setup_user_range()
402 struct mls_level *user_clr = &(user->range.level[1]); in mls_setup_user_range()
403 struct mls_level *user_def = &(user->dfltlevel); in mls_setup_user_range()
A Dservices.c780 if (!user) in security_compute_validatetrans()
820 if (user) in security_compute_validatetrans()
1831 newcontext.user = tcontext->user; in security_compute_sid()
1835 newcontext.user = scontext->user; in security_compute_sid()
1840 newcontext.user = tcontext->user; in security_compute_sid()
2807 if (!user) in security_get_user_sids()
2810 usercon.user = user->value; in security_get_user_sids()
3275 newcon.user = context1->user; in security_sid_mls_copy()
3750 match = (ctxt->user == rule->au_ctxt.user); in selinux_audit_rule_match()
3753 match = (ctxt->user != rule->au_ctxt.user); in selinux_audit_rule_match()
[all …]
A Dcontext.c29 hash = jhash_3words(c->user, c->role, c->type, hash); in context_compute_hash()
A Dmls.h50 struct user_datum *user, struct context *usercon);
A Dpolicydb.c968 if (!c->user || c->user > p->p_users.nprim) in policydb_context_isvalid()
986 usrdatum = p->user_val_to_struct[c->user - 1]; in policydb_context_isvalid()
1075 c->user = le32_to_cpu(buf[0]); in context_read_and_validate()
1688 struct user_datum *upper, *user; in user_bounds_sanity_check() local
1692 upper = user = datum; in user_bounds_sanity_check()
1705 ebitmap_for_each_positive_bit(&user->roles, node, bit) in user_bounds_sanity_check()
1712 sym_name(p, SYM_USERS, user->value - 1), in user_bounds_sanity_check()
2951 buf[0] = cpu_to_le32(c->user); in context_write()
/security/safesetid/
A DKconfig12 with CAP_SET{U/G}ID, such as allowing a user to set up user namespace
/security/integrity/ima/
A DKconfig142 This option allows the root user to see the current policy rules.
294 bool "Require signed user-space initialization"
298 This option requires user-space init to be signed.
/security/
A DKconfig158 Intel TXT also helps solve real end user concerns about having
172 int "Low address space for LSM to protect from user allocation"
178 from userspace allocation. Keeping a user from writing to low pages
/security/selinux/
A Dselinuxfs.c1065 char *con = NULL, *user = NULL, *ptr; in sel_write_user() local
1089 user = kzalloc(size + 1, GFP_KERNEL); in sel_write_user()
1090 if (!user) in sel_write_user()
1094 if (sscanf(buf, "%s %s", con, user) != 2) in sel_write_user()
1101 length = security_get_user_sids(sid, user, &sids, &nsids); in sel_write_user()
1125 kfree(user); in sel_write_user()

Completed in 56 milliseconds