Home
last modified time | relevance | path

Searched refs:user (Results 1 – 19 of 19) sorted by relevance

/security/keys/
Dkey.c53 struct key_user *candidate = NULL, *user; in key_user_lookup() local
64 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
66 if (uid_lt(uid, user->uid)) in key_user_lookup()
68 else if (uid_gt(uid, user->uid)) in key_user_lookup()
80 user = NULL; in key_user_lookup()
105 user = candidate; in key_user_lookup()
110 refcount_inc(&user->usage); in key_user_lookup()
114 return user; in key_user_lookup()
120 void key_user_put(struct key_user *user) in key_user_put() argument
122 if (refcount_dec_and_lock(&user->usage, &key_user_lock)) { in key_user_put()
[all …]
Dproc.c71 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next()
103 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key()
255 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next() local
256 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next()
306 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show() local
307 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
309 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
313 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show()
314 refcount_read(&user->usage), in proc_key_users_show()
315 atomic_read(&user->nkeys), in proc_key_users_show()
[all …]
Dgc.c160 spin_lock(&key->user->lock); in key_gc_unused_keys()
161 key->user->qnkeys--; in key_gc_unused_keys()
162 key->user->qnbytes -= key->quotalen; in key_gc_unused_keys()
163 spin_unlock(&key->user->lock); in key_gc_unused_keys()
166 atomic_dec(&key->user->nkeys); in key_gc_unused_keys()
168 atomic_dec(&key->user->nikeys); in key_gc_unused_keys()
170 key_user_put(key->user); in key_gc_unused_keys()
Drequest_key.c372 struct key_user *user, in construct_alloc_key() argument
385 mutex_lock(&user->cons_lock); in construct_alloc_key()
437 mutex_unlock(&user->cons_lock); in construct_alloc_key()
459 mutex_unlock(&user->cons_lock); in construct_alloc_key()
465 mutex_unlock(&user->cons_lock); in construct_alloc_key()
475 mutex_unlock(&user->cons_lock); in construct_alloc_key()
481 mutex_unlock(&user->cons_lock); in construct_alloc_key()
496 struct key_user *user; in construct_key_and_link() local
509 user = key_user_lookup(current_fsuid()); in construct_key_and_link()
510 if (!user) { in construct_key_and_link()
[all …]
Dkeyctl.c949 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) in keyctl_chown_key() argument
958 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key()
961 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key()
967 if (user == (uid_t) -1 && group == (gid_t) -1) in keyctl_chown_key()
987 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key()
1000 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key()
1024 spin_lock(&key->user->lock); in keyctl_chown_key()
1025 key->user->qnkeys--; in keyctl_chown_key()
1026 key->user->qnbytes -= key->quotalen; in keyctl_chown_key()
1027 spin_unlock(&key->user->lock); in keyctl_chown_key()
[all …]
DKconfig51 A particular keyring may be accessed by either the user whose keyring
100 key can be either a trusted-key or user-key type. Only encrypted
106 bool "Allow encrypted keys with user decrypted data"
110 user-provided decrypted data. The decrypted data must be hex-ascii
Dprocess_keys.c82 uid_t uid = from_kuid(user_ns, cred->user->uid); in look_up_user_keyrings()
106 uid_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID, in look_up_user_keyrings()
128 session_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID, in look_up_user_keyrings()
206 cred->user->uid)); in get_user_session_keyring_rcu()
936 new->user = get_uid(old->user); in key_change_session_keyring()
Dinternal.h71 extern void key_user_put(struct key_user *user);
Dkeyring.c1155 if (!kuid_has_mapping(ns, keyring->user->uid)) in find_keyring_by_name()
/security/selinux/ss/
Dcontext.h28 u32 user; member
155 dst->user = src->user; in context_cpy()
177 c->user = c->role = c->type = 0; in context_destroy()
190 return ((c1->user == c2->user) && in context_cmp()
Dmls.c208 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid()
210 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid()
402 struct context *fromcon, struct user_datum *user, in mls_setup_user_range() argument
408 struct mls_level *user_low = &(user->range.level[0]); in mls_setup_user_range()
409 struct mls_level *user_clr = &(user->range.level[1]); in mls_setup_user_range()
410 struct mls_level *user_def = &(user->dfltlevel); in mls_setup_user_range()
Dservices.c307 val1 = scontext->user; in constraint_expr_eval()
308 val2 = tcontext->user; in constraint_expr_eval()
415 val1 = c->user; in constraint_expr_eval()
758 u16 orig_tclass, bool user) in security_compute_validatetrans() argument
781 if (!user) in security_compute_validatetrans()
821 if (user) in security_compute_validatetrans()
1253 *scontext_len += strlen(sym_name(p, SYM_USERS, context->user - 1)) + 1; in context_struct_to_string()
1271 sym_name(p, SYM_USERS, context->user - 1), in context_struct_to_string()
1471 ctx->user = usrdatum->value; in string_to_context_struct()
1805 newcontext.user = tcontext->user; in security_compute_sid()
[all …]
Dcontext.c29 hash = jhash_3words(c->user, c->role, c->type, hash); in context_compute_hash()
Dmls.h64 struct context *fromcon, struct user_datum *user,
Dpolicydb.c933 if (!c->user || c->user > p->p_users.nprim) in policydb_context_isvalid()
951 usrdatum = p->user_val_to_struct[c->user - 1]; in policydb_context_isvalid()
1041 c->user = le32_to_cpu(buf[0]); in context_read_and_validate()
1652 struct user_datum *upper, *user; in user_bounds_sanity_check() local
1656 upper = user = datum; in user_bounds_sanity_check()
1669 ebitmap_for_each_positive_bit(&user->roles, node, bit) { in user_bounds_sanity_check()
1675 sym_name(p, SYM_USERS, user->value - 1), in user_bounds_sanity_check()
2904 buf[0] = cpu_to_le32(c->user); in context_write()
/security/safesetid/
DKconfig12 with CAP_SET{U/G}ID, such as allowing a user to set up user namespace
/security/integrity/ima/
DKconfig141 This option allows the root user to see the current policy rules.
292 bool "Require signed user-space initialization"
296 This option requires user-space init to be signed.
/security/
DKconfig105 Intel TXT also helps solve real end user concerns about having
119 int "Low address space for LSM to protect from user allocation"
125 from userspace allocation. Keeping a user from writing to low pages
/security/selinux/
Dselinuxfs.c1132 char *con = NULL, *user = NULL, *ptr; in sel_write_user() local
1152 user = kzalloc(size + 1, GFP_KERNEL); in sel_write_user()
1153 if (!user) in sel_write_user()
1157 if (sscanf(buf, "%s %s", con, user) != 2) in sel_write_user()
1164 length = security_get_user_sids(state, sid, user, &sids, &nsids); in sel_write_user()
1188 kfree(user); in sel_write_user()