Home
last modified time | relevance | path

Searched refs:tcred (Results 1 – 14 of 14) sorted by relevance

/Linux-v5.4/block/
Dioprio.c40 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio() local
43 tcred = __task_cred(task); in set_task_ioprio()
44 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio()
45 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { in set_task_ioprio()
/Linux-v5.4/kernel/
Dtsacct.c24 const struct cred *tcred; in bacct_add_tsk() local
53 tcred = __task_cred(tsk); in bacct_add_tsk()
54 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk()
55 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
Dptrace.c278 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local
316 tcred = __task_cred(task); in __ptrace_may_access()
317 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access()
318 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
319 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access()
320 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access()
321 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access()
322 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access()
324 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
Dsys.c1587 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local
1593 tcred = __task_cred(task); in check_prlimit_permission()
1594 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission()
1595 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission()
1596 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission()
1597 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission()
1598 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission()
1599 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission()
1600 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission()
1603 return security_task_prlimit(cred, tcred, flags); in check_prlimit_permission()
Dsignal.c809 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local
811 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred()
812 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred()
813 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred()
814 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred()
815 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
/Linux-v5.4/kernel/cgroup/
Dcgroup-v1.c496 const struct cred *cred, *tcred; in __cgroup1_procs_write() local
513 tcred = get_task_cred(task); in __cgroup1_procs_write()
515 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write()
516 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
518 put_cred(tcred); in __cgroup1_procs_write()
/Linux-v5.4/arch/ia64/kernel/
Dperfmon.c2313 const struct cred *tcred; in pfm_bad_permissions() local
2319 tcred = __task_cred(task); in pfm_bad_permissions()
2325 from_kuid(&init_user_ns, tcred->euid), in pfm_bad_permissions()
2326 from_kuid(&init_user_ns, tcred->suid), in pfm_bad_permissions()
2327 from_kuid(&init_user_ns, tcred->uid), in pfm_bad_permissions()
2328 from_kgid(&init_user_ns, tcred->egid), in pfm_bad_permissions()
2329 from_kgid(&init_user_ns, tcred->sgid))); in pfm_bad_permissions()
2331 ret = ((!uid_eq(uid, tcred->euid)) in pfm_bad_permissions()
2332 || (!uid_eq(uid, tcred->suid)) in pfm_bad_permissions()
2333 || (!uid_eq(uid, tcred->uid)) in pfm_bad_permissions()
[all …]
/Linux-v5.4/Documentation/security/
Dcredentials.rst373 const struct cred *tcred;
376 tcred = __task_cred(t);
377 f->uid = tcred->uid;
378 f->gid = tcred->gid;
379 f->groups = get_group_info(tcred->groups);
/Linux-v5.4/arch/x86/kernel/cpu/resctrl/
Drdtgroup.c620 const struct cred *tcred = get_task_cred(task); in rdtgroup_task_write_permission() local
629 !uid_eq(cred->euid, tcred->uid) && in rdtgroup_task_write_permission()
630 !uid_eq(cred->euid, tcred->suid)) { in rdtgroup_task_write_permission()
635 put_cred(tcred); in rdtgroup_task_write_permission()
/Linux-v5.4/include/linux/
Dsecurity.h396 int security_task_prlimit(const struct cred *cred, const struct cred *tcred,
1063 const struct cred *tcred, in security_task_prlimit() argument
Dlsm_hooks.h1643 int (*task_prlimit)(const struct cred *cred, const struct cred *tcred,
/Linux-v5.4/security/
Dsecurity.c1674 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument
1677 return call_int_hook(task_prlimit, 0, cred, tcred, flags); in security_task_prlimit()
/Linux-v5.4/security/smack/
Dsmack_lsm.c1789 const struct cred *tcred; in smack_file_send_sigiotask() local
1806 tcred = __task_cred(tsk); in smack_file_send_sigiotask()
1807 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask()
/Linux-v5.4/security/selinux/
Dhooks.c4077 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument
4089 cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()