Home
last modified time | relevance | path

Searched refs:uid (Results 1 – 8 of 8) sorted by relevance

/security/keys/
Dprocess_keys.c36 .uid = 0,
54 kenter("%p{%u}", user, user->uid); in install_user_keyrings()
69 sprintf(buf, "_uid.%u", user->uid); in install_user_keyrings()
73 uid_keyring = keyring_alloc(buf, user->uid, (gid_t) -1, in install_user_keyrings()
84 sprintf(buf, "_uid_ses.%u", user->uid); in install_user_keyrings()
89 keyring_alloc(buf, user->uid, (gid_t) -1, in install_user_keyrings()
129 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred()
174 keyring = keyring_alloc("_pid", new->uid, new->gid, in install_process_keyring_to_cred()
231 keyring = keyring_alloc("_ses", cred->uid, cred->gid, in install_session_keyring_to_cred()
287 tsk->cred->thread_keyring->uid = tsk->cred->fsuid; in key_fsuid_changed()
[all …]
Dkey.c63 struct key_user *key_user_lookup(uid_t uid) in key_user_lookup() argument
78 if (uid < user->uid) in key_user_lookup()
80 else if (uid > user->uid) in key_user_lookup()
108 candidate->uid = uid; in key_user_lookup()
221 uid_t uid, gid_t gid, const struct cred *cred, in key_alloc() argument
237 user = key_user_lookup(uid); in key_alloc()
244 unsigned maxkeys = (uid == 0) ? in key_alloc()
246 unsigned maxbytes = (uid == 0) ? in key_alloc()
279 key->uid = uid; in key_alloc()
358 unsigned maxbytes = (key->user->uid == 0) ? in key_payload_reserve()
Dkeyctl.c499 key_ref_to_ptr(key_ref)->uid, in keyctl_describe_key()
692 long keyctl_chown_key(key_serial_t id, uid_t uid, gid_t gid) in keyctl_chown_key() argument
700 if (uid == (uid_t) -1 && gid == (gid_t) -1) in keyctl_chown_key()
717 if (uid != (uid_t) -1 && key->uid != uid) in keyctl_chown_key()
727 if (uid != (uid_t) -1 && uid != key->uid) { in keyctl_chown_key()
729 newowner = key_user_lookup(uid); in keyctl_chown_key()
735 unsigned maxkeys = (uid == 0) ? in keyctl_chown_key()
737 unsigned maxbytes = (uid == 0) ? in keyctl_chown_key()
767 key->uid = uid; in keyctl_chown_key()
821 if (capable(CAP_SYS_ADMIN) || key->uid == current_fsuid()) { in keyctl_setperm_key()
Dproc.c188 key->uid, in proc_keys_show()
249 unsigned maxkeys = (user->uid == 0) ? in proc_key_users_show()
251 unsigned maxbytes = (user->uid == 0) ? in proc_key_users_show()
255 user->uid, in proc_key_users_show()
Dinternal.h55 uid_t uid; member
64 extern struct key_user *key_user_lookup(uid_t uid);
Dpermission.c39 if (key->uid == cred->fsuid) { in key_task_permission()
Dkeyring.c247 struct key *keyring_alloc(const char *description, uid_t uid, gid_t gid, in keyring_alloc() argument
255 uid, gid, cred, in keyring_alloc()
/security/
Dcommoncap.c483 if (new->euid == 0 || new->uid == 0) { in cap_bprm_set_creds()
495 if ((new->euid != old->uid || in cap_bprm_set_creds()
501 new->euid = new->uid; in cap_bprm_set_creds()
537 new->euid != 0 || new->uid != 0 || in cap_bprm_set_creds()
563 if (cred->uid != 0) { in cap_bprm_secureexec()
570 return (cred->euid != cred->uid || in cap_bprm_secureexec()
661 if ((old->uid == 0 || old->euid == 0 || old->suid == 0) && in cap_emulate_setxuid()
662 (new->uid != 0 && new->euid != 0 && new->suid != 0) && in cap_emulate_setxuid()