Searched defs:user (Results 1 - 10 of 10) sorted by relevance

/security/selinux/ss/
H A Dcontext.h6 * that can be interpreted by a user or application
23 * A security context consists of an authenticated user
27 u32 user; member in struct:context
121 dst->user = src->user;
143 c->user = c->role = c->type = 0;
156 return ((c1->user == c2->user) &&
H A Dmls.c207 if (!c->user || c->user > p->p_users.nprim)
209 usrdatum = p->user_val_to_struct[c->user - 1];
211 return 0; /* user may not be associated with range */
419 int mls_setup_user_range(struct context *fromcon, struct user_datum *user, argument
425 struct mls_level *user_low = &(user->range.level[0]);
426 struct mls_level *user_clr = &(user->range.level[1]);
427 struct mls_level *user_def = &(user->dfltlevel);
431 /* Honor the user's default level if we can */
443 that of the user'
[all...]
H A Dpolicydb.c324 * of a class, role, or user are needed.
901 if (!c->context[0].user) {
952 if (!c->user || c->user > p->p_users.nprim)
970 usrdatum = p->user_val_to_struct[c->user - 1];
975 /* user may not be associated with role */
1060 c->user = le32_to_cpu(buf[0]);
1675 struct user_datum *upper, *user; local
1679 upper = user = datum;
1685 printk(KERN_ERR "SELinux: user
[all...]
H A Dservices.c306 val1 = scontext->user;
307 val2 = tcontext->user;
414 val1 = c->user;
1193 *scontext_len += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1;
1208 * Copy the user name, role name and type name into the context.
1211 sym_name(&policydb, SYM_USERS, context->user - 1),
1214 scontextp += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) +
1327 /* Extract the user. */
1341 ctx->user = usrdatum->value;
1615 /* Set the user identit
2350 struct user_datum *user; local
[all...]
/security/keys/
H A Dproc.c98 if (kuid_has_mapping(user_ns, key->user->uid))
135 if (kuid_has_mapping(user_ns, minkey->user->uid))
283 struct key_user *user = rb_entry(n, struct key_user, node); local
284 if (kuid_has_mapping(user_ns, user->uid))
343 struct key_user *user = rb_entry(_p, struct key_user, node); local
344 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ?
346 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ?
350 from_kuid_munged(seq_user_ns(m), user->uid),
351 atomic_read(&user->usage),
352 atomic_read(&user
[all...]
H A Dprocess_keys.c30 /* The root user's tracking struct */
41 * Install the user and user session keyrings for the current process's UID.
45 struct user_struct *user; local
55 user = cred->user;
56 uid = from_kuid(cred->user_ns, user->uid);
58 kenter("%p{%u}", user, uid);
60 if (user->uid_keyring && user
[all...]
H A Drequest_key.c150 session = cred->user->session_keyring;
305 key_get(cred->user->session_keyring);
309 dest_keyring = key_get(cred->user->uid_keyring);
333 struct key_user *user,
346 mutex_lock(&user->cons_lock);
385 mutex_unlock(&user->cons_lock);
404 mutex_unlock(&user->cons_lock);
410 mutex_unlock(&user->cons_lock);
416 mutex_unlock(&user->cons_lock);
421 mutex_unlock(&user
330 construct_alloc_key(struct keyring_search_context *ctx, struct key *dest_keyring, unsigned long flags, struct key_user *user, struct key **_key) argument
436 struct key_user *user; local
[all...]
H A Dkey.c51 * Get the key quota record for a user, allocating a new record if one doesn't
56 struct key_user *candidate = NULL, *user; local
64 /* search the tree for a user record with a matching UID */
67 user = rb_entry(parent, struct key_user, node);
69 if (uid_lt(uid, user->uid))
71 else if (uid_gt(uid, user->uid))
79 /* allocate a candidate user record if we don't already have
83 user = NULL;
94 /* if we get here, then the user record still hadn't appeared on the
108 user
123 key_user_put(struct key_user *user) argument
228 struct key_user *user = NULL; local
[all...]
H A Dkeyctl.c787 * If the UID is to be changed, the new user must have sufficient quota to
788 * accept the key. The quota deduction will be removed from the old user to
789 * the new user should the attribute be changed.
793 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) argument
802 uid = make_kuid(current_user_ns(), user);
805 if ((user != (uid_t) -1) && !uid_valid(uid))
811 if (user == (uid_t) -1 && group == (gid_t) -1)
829 if (user != (uid_t) -1 && !uid_eq(key->uid, uid))
839 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) {
845 /* transfer the quota burden to the new user */
[all...]
/security/selinux/
H A Dselinuxfs.c107 SEL_USER, /* compute reachable user contexts */
918 char *con = NULL, *user = NULL, *ptr; local
935 user = kzalloc(size + 1, GFP_KERNEL);
936 if (!user)
940 if (sscanf(buf, "%s %s", con, user) != 2)
947 length = security_get_user_sids(sid, user, &sids, &nsids);
971 kfree(user);
1805 [SEL_USER] = {"user", &transaction_ops, S_IRUGO|S_IWUGO},

Completed in 2440 milliseconds