Home
last modified time | relevance | path

Searched refs:tcred (Results 1 – 11 of 11) sorted by relevance

/linux/kernel/
H A Dtsacct.c24 const struct cred *tcred; in bacct_add_tsk() local
61 tcred = __task_cred(tsk); in bacct_add_tsk()
62 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk()
63 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
H A Dptrace.c278 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local
316 tcred = __task_cred(task); in __ptrace_may_access()
317 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access()
318 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access()
319 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access()
320 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access()
321 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access()
322 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access()
324 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
H A Dsys.c1674 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local
1680 tcred = __task_cred(task); in check_prlimit_permission()
1681 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission()
1682 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission()
1683 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission()
1684 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission()
1685 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission()
1686 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission()
1687 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission()
1690 return security_task_prlimit(cred, tcred, flags); in check_prlimit_permission()
H A Dsignal.c785 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local
787 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred()
788 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred()
789 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred()
790 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred()
791 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
/linux/kernel/cgroup/
H A Dcgroup-v1.c500 const struct cred *cred, *tcred; in __cgroup1_procs_write() local
519 tcred = get_task_cred(task); in __cgroup1_procs_write()
521 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write()
522 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write()
524 put_cred(tcred); in __cgroup1_procs_write()
/linux/Documentation/security/
H A Dcredentials.rst372 const struct cred *tcred;
375 tcred = __task_cred(t);
376 f->uid = tcred->uid;
377 f->gid = tcred->gid;
378 f->groups = get_group_info(tcred->groups);
/linux/include/linux/
H A Dsecurity.h510 int security_task_prlimit(const struct cred *cred, const struct cred *tcred,
1335 const struct cred *tcred, in security_task_prlimit() argument
H A Dlsm_hook_defs.h248 const struct cred *tcred, unsigned int flags)
/linux/security/smack/
H A Dsmack_lsm.c1943 const struct cred *tcred; in smack_file_send_sigiotask() local
1960 tcred = __task_cred(tsk); in smack_file_send_sigiotask()
1961 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask()
/linux/security/
H A Dsecurity.c3584 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument
3587 return call_int_hook(task_prlimit, cred, tcred, flags); in security_task_prlimit()
/linux/security/selinux/
H A Dhooks.c4207 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument
4218 return avc_has_perm(cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()