/Linux-v6.6/net/netfilter/ |
D | xt_owner.c | 87 if ((uid_gte(filp->f_cred->fsuid, uid_min) && in owner_mt() 88 uid_lte(filp->f_cred->fsuid, uid_max)) ^ in owner_mt() 97 struct group_info *gi = filp->f_cred->group_info; in owner_mt() 99 if (gid_gte(filp->f_cred->fsgid, gid_min) && in owner_mt() 100 gid_lte(filp->f_cred->fsgid, gid_max)) in owner_mt()
|
D | nft_meta.c | 150 sock->file->f_cred->fsuid); in nft_meta_get_eval_skugid() 154 sock->file->f_cred->fsgid); in nft_meta_get_eval_skugid()
|
/Linux-v6.6/security/safesetid/ |
D | securityfs.c | 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 59 rule->src_id.gid = make_kgid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 60 rule->dst_id.gid = make_kgid(file->f_cred->user_ns, parsed_child); in parse_policy_line()
|
/Linux-v6.6/fs/ |
D | file_table.c | 68 put_cred(f->f_cred); in file_free_rcu() 160 f->f_cred = get_cred(cred); in init_file() 163 put_cred(f->f_cred); in init_file()
|
/Linux-v6.6/include/rdma/ |
D | ib.h | 78 return filp->f_cred == current_cred(); in ib_safe_file_access()
|
/Linux-v6.6/kernel/ |
D | acct.c | 505 orig_cred = override_creds(file->f_cred); in do_acct_process() 516 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid); in do_acct_process() 517 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid); in do_acct_process()
|
D | capability.c | 460 if (security_capable(file->f_cred, ns, cap, CAP_OPT_NONE) == 0) in file_ns_capable()
|
D | user_namespace.c | 883 const struct user_namespace *file_ns = file->f_cred->user_ns; in verify_root_map() 1164 const struct cred *cred = file->f_cred; in new_idmap_permitted()
|
D | kallsyms.c | 921 iter->show_value = kallsyms_show_value(file->f_cred); in kallsyms_open()
|
/Linux-v6.6/fs/efivarfs/ |
D | file.c | 76 while (!__ratelimit(&file->f_cred->user->ratelimit)) in efivarfs_file_read()
|
/Linux-v6.6/kernel/module/ |
D | procfs.c | 133 m->private = kallsyms_show_value(file->f_cred) ? NULL : (void *)8ul; in modules_open()
|
D | sysfs.c | 55 kallsyms_show_value(file->f_cred) in module_sect_read()
|
/Linux-v6.6/net/sched/ |
D | cls_flow.c | 208 kuid_t skuid = sk->sk_socket->file->f_cred->fsuid; in flow_get_skuid() 220 kgid_t skgid = sk->sk_socket->file->f_cred->fsgid; in flow_get_skgid()
|
/Linux-v6.6/include/linux/ |
D | seq_file.h | 226 return seq->file->f_cred->user_ns; in seq_user_ns()
|
/Linux-v6.6/security/keys/ |
D | proc.c | 167 .cred = m->file->f_cred, in proc_keys_show()
|
/Linux-v6.6/fs/ecryptfs/ |
D | messaging.c | 109 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
|
/Linux-v6.6/fs/nfsd/ |
D | nfsctl.c | 407 rv = nfsd_svc(newthreads, net, file->f_cred); in write_threads() 770 return __write_ports_addfd(buf, net, file->f_cred); in __write_ports() 773 return __write_ports_addxprt(buf, net, file->f_cred); in __write_ports()
|
/Linux-v6.6/fs/coda/ |
D | file.c | 274 coda_flags, coda_file->f_cred->fsuid); in coda_release()
|
/Linux-v6.6/Documentation/security/ |
D | credentials.rst | 540 credentials and this is attached to the file struct as ``f_cred`` in place of 542 ``file->f_gid`` should now access ``file->f_cred->fsuid`` and 543 ``file->f_cred->fsgid``. 545 It is safe to access ``f_cred`` without the use of RCU or locking because the
|
/Linux-v6.6/fs/autofs/ |
D | waitq.c | 138 struct user_namespace *user_ns = sbi->pipe->f_cred->user_ns; in autofs_notify_daemon()
|
/Linux-v6.6/kernel/bpf/ |
D | syscall.c | 4186 const struct cred *f_cred) in bpf_insn_prepare_dump() argument 4212 if (!bpf_dump_raw_ok(f_cred)) in bpf_insn_prepare_dump() 4346 if (prog->blinded && !bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4350 insns_sanitized = bpf_insn_prepare_dump(prog, file->f_cred); in bpf_prog_get_info_by_fd() 4384 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4419 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4450 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4510 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd()
|
/Linux-v6.6/fs/fuse/ |
D | cuse.c | 511 fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns, in cuse_channel_open()
|
/Linux-v6.6/fs/orangefs/ |
D | devorangefs-req.c | 126 if (file->f_cred->user_ns != &init_user_ns) { in orangefs_devreq_open()
|
/Linux-v6.6/security/integrity/ima/ |
D | ima_crypto.c | 558 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash()
|
/Linux-v6.6/security/smack/ |
D | smack_lsm.c | 2004 struct task_smack *tsp = smack_cred(file->f_cred); in smack_file_open() 2012 rc = smk_bu_credfile(file->f_cred, file, MAY_READ, rc); in smack_file_open() 4913 tsp = smack_cred(file->f_cred); in smack_uring_cmd() 4919 rc = smk_bu_credfile(file->f_cred, file, MAY_READ, rc); in smack_uring_cmd()
|