Searched refs:tcred (Results 1 - 12 of 12) sorted by relevance
/linux-master/kernel/ |
H A D | tsacct.c | 24 const struct cred *tcred; local 61 tcred = __task_cred(tsk); 62 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); 63 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid);
|
H A D | ptrace.c | 278 const struct cred *cred = current_cred(), *tcred; local 316 tcred = __task_cred(task); 317 if (uid_eq(caller_uid, tcred->euid) && 318 uid_eq(caller_uid, tcred->suid) && 319 uid_eq(caller_uid, tcred->uid) && 320 gid_eq(caller_gid, tcred->egid) && 321 gid_eq(caller_gid, tcred->sgid) && 322 gid_eq(caller_gid, tcred->gid)) 324 if (ptrace_has_cap(tcred->user_ns, mode))
|
H A D | sys.c | 1674 const struct cred *cred = current_cred(), *tcred; local 1680 tcred = __task_cred(task); 1681 id_match = (uid_eq(cred->uid, tcred->euid) && 1682 uid_eq(cred->uid, tcred->suid) && 1683 uid_eq(cred->uid, tcred->uid) && 1684 gid_eq(cred->gid, tcred->egid) && 1685 gid_eq(cred->gid, tcred->sgid) && 1686 gid_eq(cred->gid, tcred->gid)); 1687 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) 1690 return security_task_prlimit(cred, tcred, flag [all...] |
H A D | signal.c | 818 const struct cred *tcred = __task_cred(t); local 820 return uid_eq(cred->euid, tcred->suid) || 821 uid_eq(cred->euid, tcred->uid) || 822 uid_eq(cred->uid, tcred->suid) || 823 uid_eq(cred->uid, tcred->uid) || 824 ns_capable(tcred->user_ns, CAP_KILL);
|
/linux-master/block/ |
H A D | blk-ioc.c | 254 const struct cred *cred = current_cred(), *tcred; local 257 tcred = __task_cred(task); 258 if (!uid_eq(tcred->uid, cred->euid) && 259 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) {
|
/linux-master/kernel/cgroup/ |
H A D | cgroup-v1.c | 494 const struct cred *cred, *tcred; local 513 tcred = get_task_cred(task); 515 !uid_eq(cred->euid, tcred->uid) && 516 !uid_eq(cred->euid, tcred->suid)) 518 put_cred(tcred);
|
/linux-master/include/linux/ |
H A D | security.h | 456 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, 1251 const struct cred *tcred, 1250 security_task_prlimit(const struct cred *cred, const struct cred *tcred, unsigned int flags) argument
|
H A D | lsm_hook_defs.h | 241 const struct cred *tcred, unsigned int flags)
|
/linux-master/arch/x86/kernel/cpu/resctrl/ |
H A D | rdtgroup.c | 687 const struct cred *tcred = get_task_cred(task); local 696 !uid_eq(cred->euid, tcred->uid) && 697 !uid_eq(cred->euid, tcred->suid)) { 702 put_cred(tcred);
|
/linux-master/security/ |
H A D | security.c | 3422 * @tcred: target task credentials 3430 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, argument 3433 return call_int_hook(task_prlimit, cred, tcred, flags);
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 1920 const struct cred *tcred; local 1937 tcred = __task_cred(tsk); 1938 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred))
|
/linux-master/security/selinux/ |
H A D | hooks.c | 4187 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, argument 4198 return avc_has_perm(cred_sid(cred), cred_sid(tcred),
|
Completed in 328 milliseconds