/security/keys/ |
D | process_keys.c | 37 .uid = GLOBAL_ROOT_UID, 51 uid_t uid; in install_user_keyrings() local 56 uid = from_kuid(cred->user_ns, user->uid); in install_user_keyrings() 58 kenter("%p{%u}", user, uid); in install_user_keyrings() 73 sprintf(buf, "_uid.%u", uid); in install_user_keyrings() 77 uid_keyring = keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 88 sprintf(buf, "_uid_ses.%u", uid); in install_user_keyrings() 93 keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 135 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred() 181 keyring = keyring_alloc("_pid", new->uid, new->gid, new, in install_process_keyring_to_cred() [all …]
|
D | proc.c | 98 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 135 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key() 257 from_kuid_munged(seq_user_ns(m), key->uid), in proc_keys_show() 277 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next() 337 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 339 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 343 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show()
|
D | key.c | 54 struct key_user *key_user_lookup(kuid_t uid) in key_user_lookup() argument 69 if (uid_lt(uid, user->uid)) in key_user_lookup() 71 else if (uid_gt(uid, user->uid)) in key_user_lookup() 99 candidate->uid = uid; in key_user_lookup() 225 kuid_t uid, kgid_t gid, const struct cred *cred, in key_alloc() argument 249 user = key_user_lookup(uid); in key_alloc() 256 unsigned maxkeys = uid_eq(uid, GLOBAL_ROOT_UID) ? in key_alloc() 258 unsigned maxbytes = uid_eq(uid, GLOBAL_ROOT_UID) ? in key_alloc() 292 key->uid = uid; in key_alloc() 376 unsigned maxbytes = uid_eq(key->user->uid, GLOBAL_ROOT_UID) ? in key_payload_reserve()
|
D | keyctl.c | 583 from_kuid_munged(current_user_ns(), key->uid), in keyctl_describe_key() 786 kuid_t uid; in keyctl_chown_key() local 789 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key() 792 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key() 816 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key() 826 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key() 828 newowner = key_user_lookup(uid); in keyctl_chown_key() 834 unsigned maxkeys = uid_eq(uid, GLOBAL_ROOT_UID) ? in keyctl_chown_key() 836 unsigned maxbytes = uid_eq(uid, GLOBAL_ROOT_UID) ? in keyctl_chown_key() 866 key->uid = uid; in keyctl_chown_key() [all …]
|
D | internal.h | 57 kuid_t uid; member 66 extern struct key_user *key_user_lookup(kuid_t uid);
|
D | permission.c | 40 if (uid_eq(key->uid, cred->fsuid)) { in key_task_permission()
|
D | keyring.c | 259 struct key *keyring_alloc(const char *description, kuid_t uid, kgid_t gid, in keyring_alloc() argument 267 uid, gid, cred, perm, flags); in keyring_alloc() 613 if (!kuid_has_mapping(current_user_ns(), keyring->user->uid)) in find_keyring_by_name()
|
/security/ |
D | commoncap.c | 525 if (has_cap && !uid_eq(new->uid, root_uid) && uid_eq(new->euid, root_uid)) { in cap_bprm_set_creds() 536 if (uid_eq(new->euid, root_uid) || uid_eq(new->uid, root_uid)) { in cap_bprm_set_creds() 556 is_setid = !uid_eq(new->euid, old->uid) || !gid_eq(new->egid, old->gid); in cap_bprm_set_creds() 564 new->euid = new->uid; in cap_bprm_set_creds() 612 !uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) || in cap_bprm_set_creds() 643 if (!uid_eq(cred->uid, root_uid)) { in cap_bprm_secureexec() 650 return (!uid_eq(cred->euid, cred->uid) || in cap_bprm_secureexec() 743 if ((uid_eq(old->uid, root_uid) || in cap_emulate_setxuid() 746 (!uid_eq(new->uid, root_uid) && in cap_emulate_setxuid()
|
D | security.c | 469 int security_path_chown(struct path *path, kuid_t uid, kgid_t gid) in security_path_chown() argument 473 return security_ops->path_chown(path, uid, gid); in security_path_chown()
|
D | capability.c | 308 static int cap_path_chown(struct path *path, kuid_t uid, kgid_t gid) in cap_path_chown() argument
|
/security/integrity/ima/ |
D | ima_policy.c | 51 kuid_t uid; member 85 {.action = MEASURE,.func = FILE_CHECK,.mask = MAY_READ,.uid = GLOBAL_ROOT_UID, 181 if ((rule->flags & IMA_UID) && !uid_eq(rule->uid, cred->uid)) in ima_match_rules() 420 entry->uid = INVALID_UID; in ima_parse_rule() 546 if (uid_valid(entry->uid)) { in ima_parse_rule() 553 entry->uid = make_kuid(current_user_ns(), (uid_t)lnum); in ima_parse_rule() 554 if (!uid_valid(entry->uid) || (((uid_t)lnum) != lnum)) in ima_parse_rule()
|
D | ima_audit.c | 43 from_kuid(&init_user_ns, current_cred()->uid), in integrity_audit_msg()
|
/security/apparmor/ |
D | file.c | 206 if (uid_eq(current_fsuid(), cond->uid)) { in compute_perms() 304 NULL, cond->uid, info, error); in aa_path_perm() 432 lname, tname, cond.uid, info, error); in aa_path_link() 452 .uid = file_inode(file)->i_uid, in aa_file_perm()
|
D | lsm.c | 232 cond.uid = inode->i_uid; in common_perm_rm() 355 static int apparmor_path_chown(struct path *path, kuid_t uid, kgid_t gid) in apparmor_path_chown() argument
|
D | domain.c | 525 name, target, cond.uid, info, error); in apparmor_bprm_set_creds()
|
/security/tomoyo/ |
D | tomoyo.c | 376 static int tomoyo_path_chown(struct path *path, kuid_t uid, kgid_t gid) in tomoyo_path_chown() argument 379 if (uid_valid(uid)) in tomoyo_path_chown() 381 from_kuid(&init_user_ns, uid)); in tomoyo_path_chown()
|
D | audit.c | 199 from_kuid(&init_user_ns, stat->uid), in tomoyo_print_header() 208 from_kuid(&init_user_ns, stat->uid), in tomoyo_print_header()
|
D | condition.c | 720 stat->uid = inode->i_uid; in tomoyo_get_attributes() 973 value = from_kuid(&init_user_ns, stat->uid); in tomoyo_condition()
|
D | common.h | 564 kuid_t uid; member
|
D | common.c | 929 (!uid_eq(task->cred->uid, GLOBAL_ROOT_UID) || in tomoyo_manager()
|
/security/integrity/evm/ |
D | evm_crypto.c | 101 uid_t uid; in hmac_add_misc() member 109 hmac_misc.uid = from_kuid(&init_user_ns, inode->i_uid); in hmac_add_misc()
|
/security/apparmor/include/ |
D | file.h | 74 kuid_t uid; member
|