Home
last modified time | relevance | path

Searched refs:f_cred (Results 1 – 25 of 38) sorted by relevance

12

/Linux-v5.4/net/netfilter/
Dxt_owner.c87 if ((uid_gte(filp->f_cred->fsuid, uid_min) && in owner_mt()
88 uid_lte(filp->f_cred->fsuid, uid_max)) ^ in owner_mt()
97 struct group_info *gi = filp->f_cred->group_info; in owner_mt()
99 if (gid_gte(filp->f_cred->fsgid, gid_min) && in owner_mt()
100 gid_lte(filp->f_cred->fsgid, gid_max)) in owner_mt()
Dnf_log_common.c140 const struct cred *cred = sk->sk_socket->file->f_cred; in nf_log_dump_sk_uid_gid()
Dnft_meta.c126 sk->sk_socket->file->f_cred->fsuid); in nft_meta_get_eval()
142 sk->sk_socket->file->f_cred->fsgid); in nft_meta_get_eval()
Dnfnetlink_log.c607 const struct cred *cred = file->f_cred; in __build_packet_message()
/Linux-v5.4/drivers/staging/isdn/hysdn/
Dhysdn_procconf.c240 filep->f_cred->fsuid, filep->f_cred->fsgid, in hysdn_conf_open()
314 filep->f_cred->fsuid, filep->f_cred->fsgid, in hysdn_conf_close()
/Linux-v5.4/security/safesetid/
Dsecurityfs.c52 rule->src_uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line()
53 rule->dst_uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line()
/Linux-v5.4/include/rdma/
Dib.h105 return filp->f_cred == current_cred() && !uaccess_kernel(); in ib_safe_file_access()
/Linux-v5.4/kernel/
Dacct.c484 orig_cred = override_creds(file->f_cred); in do_acct_process()
495 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid); in do_acct_process()
496 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid); in do_acct_process()
Dcapability.c473 if (security_capable(file->f_cred, ns, cap, CAP_OPT_NONE) == 0) in file_ns_capable()
Duser_namespace.c1088 const struct cred *cred = file->f_cred; in new_idmap_permitted()
/Linux-v5.4/fs/
Dfile_table.c49 put_cred(f->f_cred); in file_free_rcu()
105 f->f_cred = get_cred(cred); in __alloc_file()
/Linux-v5.4/fs/efivarfs/
Dfile.c75 while (!__ratelimit(&file->f_cred->user->ratelimit)) { in efivarfs_file_read()
/Linux-v5.4/include/linux/
Dseq_file.h166 return seq->file->f_cred->user_ns; in seq_user_ns()
/Linux-v5.4/net/sched/
Dcls_flow.c207 kuid_t skuid = sk->sk_socket->file->f_cred->fsuid; in flow_get_skuid()
219 kgid_t skgid = sk->sk_socket->file->f_cred->fsgid; in flow_get_skgid()
/Linux-v5.4/fs/nfsd/
Dnfsctl.c446 rv = nfsd_svc(newthreads, net, file->f_cred); in write_threads()
806 return __write_ports_addfd(buf, net, file->f_cred); in __write_ports()
809 return __write_ports_addxprt(buf, net, file->f_cred); in __write_ports()
/Linux-v5.4/security/keys/
Dproc.c165 .cred = m->file->f_cred, in proc_keys_show()
/Linux-v5.4/fs/ecryptfs/
Dmessaging.c109 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
/Linux-v5.4/fs/coda/
Dfile.c246 coda_flags, coda_file->f_cred->fsuid); in coda_release()
/Linux-v5.4/Documentation/security/
Dcredentials.rst541 credentials and this is attached to the file struct as ``f_cred`` in place of
543 ``file->f_gid`` should now access ``file->f_cred->fsuid`` and
544 ``file->f_cred->fsgid``.
546 It is safe to access ``f_cred`` without the use of RCU or locking because the
/Linux-v5.4/fs/autofs/
Dwaitq.c137 struct user_namespace *user_ns = sbi->pipe->f_cred->user_ns; in autofs_notify_daemon()
/Linux-v5.4/fs/fuse/
Dcuse.c509 fuse_conn_init(&cc->fc, file->f_cred->user_ns, &fuse_dev_fiq_ops, NULL); in cuse_channel_open()
/Linux-v5.4/security/integrity/ima/
Dima_crypto.c431 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash()
/Linux-v5.4/fs/orangefs/
Ddevorangefs-req.c126 if (file->f_cred->user_ns != &init_user_ns) { in orangefs_devreq_open()
/Linux-v5.4/drivers/hid/
Duhid.c729 if (file->f_cred != current_cred() || uaccess_kernel()) { in uhid_char_write()
/Linux-v5.4/net/sunrpc/
Dsvcauth_unix.c559 struct user_namespace *user_ns = m->file->f_cred->user_ns; in unix_gid_show()

12