Lines Matching full:old

255 	const struct cred *old;  in prepare_creds()  local
266 old = task->cred; in prepare_creds()
267 memcpy(new, old, sizeof(struct cred)); in prepare_creds()
291 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_creds()
438 * the old set. Both the objective and the subjective credentials pointers are
450 const struct cred *old = task->real_cred; in commit_creds() local
456 BUG_ON(task->cred != old); in commit_creds()
458 BUG_ON(read_cred_subscribers(old) < 2); in commit_creds()
459 validate_creds(old); in commit_creds()
467 if (!uid_eq(old->euid, new->euid) || in commit_creds()
468 !gid_eq(old->egid, new->egid) || in commit_creds()
469 !uid_eq(old->fsuid, new->fsuid) || in commit_creds()
470 !gid_eq(old->fsgid, new->fsgid) || in commit_creds()
471 !cred_cap_issubset(old, new)) { in commit_creds()
488 if (!uid_eq(new->fsuid, old->fsuid)) in commit_creds()
490 if (!gid_eq(new->fsgid, old->fsgid)) in commit_creds()
498 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
502 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds()
503 dec_rlimit_ucounts(old->ucounts, UCOUNT_RLIMIT_NPROC, 1); in commit_creds()
504 alter_cred_subscribers(old, -2); in commit_creds()
507 if (!uid_eq(new->uid, old->uid) || in commit_creds()
508 !uid_eq(new->euid, old->euid) || in commit_creds()
509 !uid_eq(new->suid, old->suid) || in commit_creds()
510 !uid_eq(new->fsuid, old->fsuid)) in commit_creds()
513 if (!gid_eq(new->gid, old->gid) || in commit_creds()
514 !gid_eq(new->egid, old->egid) || in commit_creds()
515 !gid_eq(new->sgid, old->sgid) || in commit_creds()
516 !gid_eq(new->fsgid, old->fsgid)) in commit_creds()
519 /* release the old obj and subj refs both */ in commit_creds()
520 put_cred(old); in commit_creds()
521 put_cred(old); in commit_creds()
552 * process, returning the old set for later reversion.
556 const struct cred *old = current->cred; in override_creds() local
562 validate_creds(old); in override_creds()
579 alter_cred_subscribers(old, -1); in override_creds()
581 kdebug("override_creds() = %p{%d,%d}", old, in override_creds()
582 atomic_read(&old->usage), in override_creds()
583 read_cred_subscribers(old)); in override_creds()
584 return old; in override_creds()
590 * @old: The credentials to be restored
592 * Revert a temporary set of override subjective credentials to an old set,
595 void revert_creds(const struct cred *old) in revert_creds() argument
599 kdebug("revert_creds(%p{%d,%d})", old, in revert_creds()
600 atomic_read(&old->usage), in revert_creds()
601 read_cred_subscribers(old)); in revert_creds()
603 validate_creds(old); in revert_creds()
605 alter_cred_subscribers(old, 1); in revert_creds()
606 rcu_assign_pointer(current->cred, old); in revert_creds()
669 const struct cred *old = task->real_cred; in set_cred_ucounts() local
672 if (new->user == old->user && new->user_ns == old->user_ns) in set_cred_ucounts()
720 const struct cred *old; in prepare_kernel_cred() local
730 old = get_task_cred(daemon); in prepare_kernel_cred()
732 old = get_cred(&init_cred); in prepare_kernel_cred()
734 validate_creds(old); in prepare_kernel_cred()
736 *new = *old; in prepare_kernel_cred()
759 if (security_prepare_creds(new, old, GFP_KERNEL_ACCOUNT) < 0) in prepare_kernel_cred()
762 put_cred(old); in prepare_kernel_cred()
768 put_cred(old); in prepare_kernel_cred()