/Linux-v4.19/net/sunrpc/ |
D | auth_generic.c | 230 struct rpc_cred *tcred; in generic_key_timeout() local 243 tcred = auth->au_ops->lookup_cred(auth, acred, 0); in generic_key_timeout() 244 if (IS_ERR(tcred)) in generic_key_timeout() 248 ret = tcred->cr_ops->crkey_timeout(tcred); in generic_key_timeout() 257 from_kuid(&init_user_ns, tcred->cr_uid)); in generic_key_timeout() 262 put_rpccred(tcred); in generic_key_timeout()
|
/Linux-v4.19/block/ |
D | ioprio.c | 39 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio() local 42 tcred = __task_cred(task); in set_task_ioprio() 43 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio() 44 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { in set_task_ioprio()
|
/Linux-v4.19/kernel/ |
D | tsacct.c | 35 const struct cred *tcred; in bacct_add_tsk() local 64 tcred = __task_cred(tsk); in bacct_add_tsk() 65 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk() 66 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
|
D | ptrace.c | 273 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local 311 tcred = __task_cred(task); in __ptrace_may_access() 312 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access() 313 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access() 314 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access() 315 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access() 316 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access() 317 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access() 319 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
|
D | sys.c | 1593 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local 1599 tcred = __task_cred(task); in check_prlimit_permission() 1600 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission() 1601 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission() 1602 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission() 1603 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission() 1604 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission() 1605 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission() 1606 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission() 1609 return security_task_prlimit(cred, tcred, flags); in check_prlimit_permission()
|
D | signal.c | 750 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local 752 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 753 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred() 754 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 755 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred() 756 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
|
/Linux-v4.19/kernel/cgroup/ |
D | cgroup-v1.c | 524 const struct cred *cred, *tcred; in __cgroup1_procs_write() local 541 tcred = get_task_cred(task); in __cgroup1_procs_write() 543 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 544 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write() 546 put_cred(tcred); in __cgroup1_procs_write()
|
/Linux-v4.19/arch/ia64/kernel/ |
D | perfmon.c | 2360 const struct cred *tcred; in pfm_bad_permissions() local 2366 tcred = __task_cred(task); in pfm_bad_permissions() 2372 from_kuid(&init_user_ns, tcred->euid), in pfm_bad_permissions() 2373 from_kuid(&init_user_ns, tcred->suid), in pfm_bad_permissions() 2374 from_kuid(&init_user_ns, tcred->uid), in pfm_bad_permissions() 2375 from_kgid(&init_user_ns, tcred->egid), in pfm_bad_permissions() 2376 from_kgid(&init_user_ns, tcred->sgid))); in pfm_bad_permissions() 2378 ret = ((!uid_eq(uid, tcred->euid)) in pfm_bad_permissions() 2379 || (!uid_eq(uid, tcred->suid)) in pfm_bad_permissions() 2380 || (!uid_eq(uid, tcred->uid)) in pfm_bad_permissions() [all …]
|
/Linux-v4.19/Documentation/security/ |
D | credentials.rst | 373 const struct cred *tcred; 376 tcred = __task_cred(t); 377 f->uid = tcred->uid; 378 f->gid = tcred->gid; 379 f->groups = get_group_info(tcred->groups);
|
/Linux-v4.19/arch/x86/kernel/cpu/ |
D | intel_rdt_rdtgroup.c | 618 const struct cred *tcred = get_task_cred(task); in rdtgroup_task_write_permission() local 627 !uid_eq(cred->euid, tcred->uid) && in rdtgroup_task_write_permission() 628 !uid_eq(cred->euid, tcred->suid)) { in rdtgroup_task_write_permission() 633 put_cred(tcred); in rdtgroup_task_write_permission()
|
/Linux-v4.19/include/linux/ |
D | security.h | 357 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, 994 const struct cred *tcred, in security_task_prlimit() argument
|
D | lsm_hooks.h | 1602 int (*task_prlimit)(const struct cred *cred, const struct cred *tcred,
|
/Linux-v4.19/security/ |
D | security.c | 1123 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument 1126 return call_int_hook(task_prlimit, 0, cred, tcred, flags); in security_task_prlimit()
|
/Linux-v4.19/security/selinux/ |
D | hooks.c | 4135 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument 4147 cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()
|