Searched refs:user_ns (Results 1 – 6 of 6) sorted by relevance
| /security/keys/ |
| A D | proc.c | 66 struct user_namespace *user_ns = seq_user_ns(p); in key_serial_next() local 71 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 80 struct user_namespace *user_ns = seq_user_ns(p); in find_ge_key() local 103 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key() 252 static struct rb_node *__key_user_next(struct user_namespace *user_ns, struct rb_node *n) in __key_user_next() argument 256 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next() 263 static struct rb_node *key_user_next(struct user_namespace *user_ns, struct rb_node *n) in key_user_next() argument 265 return __key_user_next(user_ns, rb_next(n)); in key_user_next() 268 static struct rb_node *key_user_first(struct user_namespace *user_ns, struct rb_root *r) in key_user_first() argument 271 return __key_user_next(user_ns, n); in key_user_first()
|
| A D | process_keys.c | 45 down_write(&user_ns->keyring_sem); in get_user_register() 50 reg_keyring = user_ns->user_keyring_register; in get_user_register() 53 user_ns->owner, INVALID_GID, in get_user_register() 64 up_write(&user_ns->keyring_sem); in get_user_register() 82 uid_t uid = from_kuid(user_ns, cred->user->uid); in look_up_user_keyrings() 90 reg_keyring = get_user_register(user_ns); in look_up_user_keyrings() 94 down_write(&user_ns->keyring_sem); in look_up_user_keyrings() 158 up_write(&user_ns->keyring_sem); in look_up_user_keyrings() 176 up_write(&user_ns->keyring_sem); in look_up_user_keyrings() 205 from_kuid(cred->user_ns, in get_user_session_keyring_rcu() [all …]
|
| /security/ |
| A D | commoncap.c | 127 const struct user_namespace *cred_ns = cred->user_ns; in cap_capable() 177 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_access_check() 180 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check() 209 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_traceme() 925 root_uid = make_kuid(new->user_ns, 0); in cap_bprm_creds_from_file() 942 !ptracer_capable(current, new->user_ns))) { in cap_bprm_creds_from_file() 944 if (!ns_capable(new->user_ns, CAP_SETUID) || in cap_bprm_creds_from_file() 1032 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_setxattr() 1076 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_removexattr() 1112 kuid_t root_uid = make_kuid(old->user_ns, 0); in cap_emulate_setxuid() [all …]
|
| /security/safesetid/ |
| A D | securityfs.c | 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 59 rule->src_id.gid = make_kgid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 60 rule->dst_id.gid = make_kgid(file->f_cred->user_ns, parsed_child); in parse_policy_line()
|
| /security/apparmor/ |
| A D | policy.c | 849 struct user_namespace *user_ns = subj_cred->user_ns; in aa_policy_view_capable() local 851 bool root_in_user_ns = uid_eq(current_euid(), make_kuid(user_ns, 0)) || in aa_policy_view_capable() 852 in_egroup_p(make_kgid(user_ns, 0)); in aa_policy_view_capable() 858 (user_ns == &init_user_ns || in aa_policy_view_capable() 860 user_ns->level == view_ns->level))) in aa_policy_view_capable() 869 struct user_namespace *user_ns = subj_cred->user_ns; in aa_policy_admin_capable() local 870 bool capable = policy_ns_capable(subj_cred, label, user_ns, in aa_policy_admin_capable()
|
| /security/yama/ |
| A D | yama_lsm.c | 366 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 372 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
|
Completed in 17 milliseconds