/security/selinux/ss/ |
H A D | context.h | 6 * that can be interpreted by a user or application 23 * A security context consists of an authenticated user 27 u32 user; member in struct:context 121 dst->user = src->user; 143 c->user = c->role = c->type = 0; 156 return ((c1->user == c2->user) &&
|
H A D | mls.c | 207 if (!c->user || c->user > p->p_users.nprim) 209 usrdatum = p->user_val_to_struct[c->user - 1]; 211 return 0; /* user may not be associated with range */ 419 int mls_setup_user_range(struct context *fromcon, struct user_datum *user, argument 425 struct mls_level *user_low = &(user->range.level[0]); 426 struct mls_level *user_clr = &(user->range.level[1]); 427 struct mls_level *user_def = &(user->dfltlevel); 431 /* Honor the user's default level if we can */ 443 that of the user' [all...] |
H A D | policydb.c | 324 * of a class, role, or user are needed. 901 if (!c->context[0].user) { 952 if (!c->user || c->user > p->p_users.nprim) 970 usrdatum = p->user_val_to_struct[c->user - 1]; 975 /* user may not be associated with role */ 1060 c->user = le32_to_cpu(buf[0]); 1675 struct user_datum *upper, *user; local 1679 upper = user = datum; 1685 printk(KERN_ERR "SELinux: user [all...] |
H A D | services.c | 306 val1 = scontext->user; 307 val2 = tcontext->user; 414 val1 = c->user; 1193 *scontext_len += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1; 1208 * Copy the user name, role name and type name into the context. 1211 sym_name(&policydb, SYM_USERS, context->user - 1), 1214 scontextp += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1327 /* Extract the user. */ 1341 ctx->user = usrdatum->value; 1615 /* Set the user identit 2350 struct user_datum *user; local [all...] |
/security/keys/ |
H A D | proc.c | 98 if (kuid_has_mapping(user_ns, key->user->uid)) 135 if (kuid_has_mapping(user_ns, minkey->user->uid)) 283 struct key_user *user = rb_entry(n, struct key_user, node); local 284 if (kuid_has_mapping(user_ns, user->uid)) 343 struct key_user *user = rb_entry(_p, struct key_user, node); local 344 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? 346 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? 350 from_kuid_munged(seq_user_ns(m), user->uid), 351 atomic_read(&user->usage), 352 atomic_read(&user [all...] |
H A D | process_keys.c | 30 /* The root user's tracking struct */ 41 * Install the user and user session keyrings for the current process's UID. 45 struct user_struct *user; local 55 user = cred->user; 56 uid = from_kuid(cred->user_ns, user->uid); 58 kenter("%p{%u}", user, uid); 60 if (user->uid_keyring && user [all...] |
H A D | request_key.c | 150 session = cred->user->session_keyring; 305 key_get(cred->user->session_keyring); 309 dest_keyring = key_get(cred->user->uid_keyring); 333 struct key_user *user, 346 mutex_lock(&user->cons_lock); 385 mutex_unlock(&user->cons_lock); 404 mutex_unlock(&user->cons_lock); 410 mutex_unlock(&user->cons_lock); 416 mutex_unlock(&user->cons_lock); 421 mutex_unlock(&user 330 construct_alloc_key(struct keyring_search_context *ctx, struct key *dest_keyring, unsigned long flags, struct key_user *user, struct key **_key) argument 436 struct key_user *user; local [all...] |
H A D | key.c | 51 * Get the key quota record for a user, allocating a new record if one doesn't 56 struct key_user *candidate = NULL, *user; local 64 /* search the tree for a user record with a matching UID */ 67 user = rb_entry(parent, struct key_user, node); 69 if (uid_lt(uid, user->uid)) 71 else if (uid_gt(uid, user->uid)) 79 /* allocate a candidate user record if we don't already have 83 user = NULL; 94 /* if we get here, then the user record still hadn't appeared on the 108 user 123 key_user_put(struct key_user *user) argument 228 struct key_user *user = NULL; local [all...] |
H A D | keyctl.c | 787 * If the UID is to be changed, the new user must have sufficient quota to 788 * accept the key. The quota deduction will be removed from the old user to 789 * the new user should the attribute be changed. 793 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) argument 802 uid = make_kuid(current_user_ns(), user); 805 if ((user != (uid_t) -1) && !uid_valid(uid)) 811 if (user == (uid_t) -1 && group == (gid_t) -1) 829 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) 839 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { 845 /* transfer the quota burden to the new user */ [all...] |
/security/selinux/ |
H A D | selinuxfs.c | 107 SEL_USER, /* compute reachable user contexts */ 918 char *con = NULL, *user = NULL, *ptr; local 935 user = kzalloc(size + 1, GFP_KERNEL); 936 if (!user) 940 if (sscanf(buf, "%s %s", con, user) != 2) 947 length = security_get_user_sids(sid, user, &sids, &nsids); 971 kfree(user); 1805 [SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},
|