Searched refs:uid (Results 1 – 8 of 8) sorted by relevance
/security/keys/ |
D | process_keys.c | 36 .uid = 0, 54 kenter("%p{%u}", user, user->uid); in install_user_keyrings() 69 sprintf(buf, "_uid.%u", user->uid); in install_user_keyrings() 73 uid_keyring = keyring_alloc(buf, user->uid, (gid_t) -1, in install_user_keyrings() 84 sprintf(buf, "_uid_ses.%u", user->uid); in install_user_keyrings() 89 keyring_alloc(buf, user->uid, (gid_t) -1, in install_user_keyrings() 129 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred() 174 keyring = keyring_alloc("_pid", new->uid, new->gid, in install_process_keyring_to_cred() 231 keyring = keyring_alloc("_ses", cred->uid, cred->gid, in install_session_keyring_to_cred() 287 tsk->cred->thread_keyring->uid = tsk->cred->fsuid; in key_fsuid_changed() [all …]
|
D | key.c | 63 struct key_user *key_user_lookup(uid_t uid) in key_user_lookup() argument 78 if (uid < user->uid) in key_user_lookup() 80 else if (uid > user->uid) in key_user_lookup() 108 candidate->uid = uid; in key_user_lookup() 221 uid_t uid, gid_t gid, const struct cred *cred, in key_alloc() argument 237 user = key_user_lookup(uid); in key_alloc() 244 unsigned maxkeys = (uid == 0) ? in key_alloc() 246 unsigned maxbytes = (uid == 0) ? in key_alloc() 279 key->uid = uid; in key_alloc() 358 unsigned maxbytes = (key->user->uid == 0) ? in key_payload_reserve()
|
D | keyctl.c | 499 key_ref_to_ptr(key_ref)->uid, in keyctl_describe_key() 692 long keyctl_chown_key(key_serial_t id, uid_t uid, gid_t gid) in keyctl_chown_key() argument 700 if (uid == (uid_t) -1 && gid == (gid_t) -1) in keyctl_chown_key() 717 if (uid != (uid_t) -1 && key->uid != uid) in keyctl_chown_key() 727 if (uid != (uid_t) -1 && uid != key->uid) { in keyctl_chown_key() 729 newowner = key_user_lookup(uid); in keyctl_chown_key() 735 unsigned maxkeys = (uid == 0) ? in keyctl_chown_key() 737 unsigned maxbytes = (uid == 0) ? in keyctl_chown_key() 767 key->uid = uid; in keyctl_chown_key() 821 if (capable(CAP_SYS_ADMIN) || key->uid == current_fsuid()) { in keyctl_setperm_key()
|
D | proc.c | 188 key->uid, in proc_keys_show() 249 unsigned maxkeys = (user->uid == 0) ? in proc_key_users_show() 251 unsigned maxbytes = (user->uid == 0) ? in proc_key_users_show() 255 user->uid, in proc_key_users_show()
|
D | internal.h | 55 uid_t uid; member 64 extern struct key_user *key_user_lookup(uid_t uid);
|
D | permission.c | 39 if (key->uid == cred->fsuid) { in key_task_permission()
|
D | keyring.c | 247 struct key *keyring_alloc(const char *description, uid_t uid, gid_t gid, in keyring_alloc() argument 255 uid, gid, cred, in keyring_alloc()
|
/security/ |
D | commoncap.c | 483 if (new->euid == 0 || new->uid == 0) { in cap_bprm_set_creds() 495 if ((new->euid != old->uid || in cap_bprm_set_creds() 501 new->euid = new->uid; in cap_bprm_set_creds() 537 new->euid != 0 || new->uid != 0 || in cap_bprm_set_creds() 563 if (cred->uid != 0) { in cap_bprm_secureexec() 570 return (cred->euid != cred->uid || in cap_bprm_secureexec() 661 if ((old->uid == 0 || old->euid == 0 || old->suid == 0) && in cap_emulate_setxuid() 662 (new->uid != 0 && new->euid != 0 && new->suid != 0) && in cap_emulate_setxuid()
|