-
- Downloads
userns: Convert security/keys to the new userns infrastructure
- Replace key_user ->user_ns equality checks with kuid_has_mapping checks.
- Use from_kuid to generate key descriptions
- Use kuid_t and kgid_t and the associated helpers instead of uid_t and gid_t
- Avoid potential problems with file descriptor passing by displaying
keys in the user namespace of the opener of key status proc files.
Cc: linux-security-module@vger.kernel.org
Cc: keyrings@linux-nfs.org
Cc: David Howells <dhowells@redhat.com>
Signed-off-by:
Eric W. Biederman <ebiederm@xmission.com>
Showing
- include/linux/key.h 5 additions, 4 deletionsinclude/linux/key.h
- init/Kconfig 0 additions, 1 deletioninit/Kconfig
- security/keys/internal.h 2 additions, 4 deletionssecurity/keys/internal.h
- security/keys/key.c 8 additions, 15 deletionssecurity/keys/key.c
- security/keys/keyctl.c 30 additions, 20 deletionssecurity/keys/keyctl.c
- security/keys/keyring.c 2 additions, 2 deletionssecurity/keys/keyring.c
- security/keys/permission.c 4 additions, 10 deletionssecurity/keys/permission.c
- security/keys/proc.c 22 additions, 22 deletionssecurity/keys/proc.c
- security/keys/process_keys.c 8 additions, 7 deletionssecurity/keys/process_keys.c
- security/keys/request_key.c 3 additions, 3 deletionssecurity/keys/request_key.c
Loading
Please register or sign in to comment