WSL2-Linux-Kernel/security/keys
Serge E. Hallyn 8ff3bc3138 keys: consider user namespace in key_permission
If a key is owned by another user namespace, then treat the
key as though it is owned by both another uid and gid.

Signed-off-by: Serge E. Hallyn <serue@us.ibm.com>
Acked-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <jmorris@namei.org>
2009-02-27 12:35:09 +11:00
..
Makefile keys: make the keyring quotas controllable through /proc/sys 2008-04-29 08:06:17 -07:00
compat.c keys: add keyctl function to get a security label 2008-04-29 08:06:16 -07:00
internal.h keys: distinguish per-uid keys in different namespaces 2009-02-27 12:35:06 +11:00
key.c keys: distinguish per-uid keys in different namespaces 2009-02-27 12:35:06 +11:00
keyctl.c keys: distinguish per-uid keys in different namespaces 2009-02-27 12:35:06 +11:00
keyring.c CRED: Inaugurate COW credentials 2008-11-14 10:39:23 +11:00
permission.c keys: consider user namespace in key_permission 2009-02-27 12:35:09 +11:00
proc.c CRED: Inaugurate COW credentials 2008-11-14 10:39:23 +11:00
process_keys.c keys: distinguish per-uid keys in different namespaces 2009-02-27 12:35:06 +11:00
request_key.c keys: distinguish per-uid keys in different namespaces 2009-02-27 12:35:06 +11:00
request_key_auth.c CRED: Inaugurate COW credentials 2008-11-14 10:39:23 +11:00
sysctl.c keys: make the keyring quotas controllable through /proc/sys 2008-04-29 08:06:17 -07:00
user_defined.c [PATCH] remove many unneeded #includes of sched.h 2007-02-14 08:09:54 -08:00