| /linux/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 317 const struct cred *tcred; 320 tcred = __task_cred(t); 321 f->uid = tcred->uid; 322 f->gid = tcred->gid; 323 f->groups = get_group_info(tcred->groups);
|
| /linux/kernel/ |
| H A D | tsacct.c | 24 const struct cred *tcred; in bacct_add_tsk() local 62 tcred = __task_cred(tsk); in bacct_add_tsk() 63 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk() 64 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
|
| H A D | ptrace.c | 278 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local 316 tcred = __task_cred(task); in __ptrace_may_access() 317 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access() 318 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access() 319 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access() 320 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access() 321 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access() 322 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access() 324 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
|
| H A D | sys.c | 1710 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local 1716 tcred = __task_cred(task); in check_prlimit_permission() 1717 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission() 1718 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission() 1719 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission() 1720 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission() 1721 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission() 1722 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission() 1723 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission() 1726 return security_task_prlimit(cred, tcred, flags); in check_prlimit_permission()
|
| H A D | signal.c | 786 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local 788 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 789 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred() 790 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 791 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred() 792 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
|
| /linux/block/ |
| H A D | blk-ioc.c | 247 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio() local 250 tcred = __task_cred(task); in set_task_ioprio() 251 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio() 252 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { in set_task_ioprio()
|
| /linux/kernel/cgroup/ |
| H A D | cgroup-v1.c | 504 const struct cred *cred, *tcred; in __cgroup1_procs_write() local 523 tcred = get_task_cred(task); in __cgroup1_procs_write() 525 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 526 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write() 528 put_cred(tcred); in __cgroup1_procs_write()
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 372 const struct cred *tcred; 375 tcred = __task_cred(t); 376 f->uid = tcred->uid; 377 f->gid = tcred->gid; 378 f->groups = get_group_info(tcred->groups);
|
| /linux/fs/resctrl/ |
| H A D | rdtgroup.c | 715 const struct cred *tcred = get_task_cred(task); in rdtgroup_task_write_permission() local 724 !uid_eq(cred->euid, tcred->uid) && in rdtgroup_task_write_permission() 725 !uid_eq(cred->euid, tcred->suid)) { in rdtgroup_task_write_permission() 730 put_cred(tcred); in rdtgroup_task_write_permission()
|
| /linux/include/linux/ |
| H A D | security.h | 524 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, 1360 const struct cred *tcred, in security_task_prlimit() argument
|
| H A D | lsm_hook_defs.h | 250 const struct cred *tcred, unsigned int flags)
|
| /linux/security/smack/ |
| H A D | smack_lsm.c | 1926 const struct cred *tcred; in smack_file_send_sigiotask() local 1943 tcred = __task_cred(tsk); in smack_file_send_sigiotask() 1944 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask()
|
| /linux/security/ |
| H A D | security.c | 3662 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument 3665 return call_int_hook(task_prlimit, cred, tcred, flags); in security_task_prlimit()
|
| /linux/security/selinux/ |
| H A D | hooks.c | 4394 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument 4405 return avc_has_perm(cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()
|