/linux-4.4.14/net/sunrpc/ |
H A D | auth_generic.c | 215 struct rpc_cred *tcred; generic_key_timeout() local 228 tcred = auth->au_ops->lookup_cred(auth, acred, 0); generic_key_timeout() 229 if (IS_ERR(tcred)) generic_key_timeout() 232 if (!tcred->cr_ops->crkey_timeout) { generic_key_timeout() 239 ret = tcred->cr_ops->crkey_timeout(tcred); generic_key_timeout() 248 from_kuid(&init_user_ns, tcred->cr_uid)); generic_key_timeout() 254 put_rpccred(tcred); generic_key_timeout()
|
/linux-4.4.14/block/ |
H A D | ioprio.c | 36 const struct cred *cred = current_cred(), *tcred; set_task_ioprio() local 39 tcred = __task_cred(task); set_task_ioprio() 40 if (!uid_eq(tcred->uid, cred->euid) && set_task_ioprio() 41 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { set_task_ioprio()
|
/linux-4.4.14/kernel/ |
H A D | tsacct.c | 33 const struct cred *tcred; bacct_add_tsk() local 62 tcred = __task_cred(tsk); bacct_add_tsk() 63 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); bacct_add_tsk() 64 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); bacct_add_tsk()
|
H A D | ptrace.c | 221 const struct cred *cred = current_cred(), *tcred; __ptrace_may_access() local 259 tcred = __task_cred(task); __ptrace_may_access() 260 if (uid_eq(caller_uid, tcred->euid) && __ptrace_may_access() 261 uid_eq(caller_uid, tcred->suid) && __ptrace_may_access() 262 uid_eq(caller_uid, tcred->uid) && __ptrace_may_access() 263 gid_eq(caller_gid, tcred->egid) && __ptrace_may_access() 264 gid_eq(caller_gid, tcred->sgid) && __ptrace_may_access() 265 gid_eq(caller_gid, tcred->gid)) __ptrace_may_access() 267 if (ptrace_has_cap(tcred->user_ns, mode)) __ptrace_may_access()
|
H A D | sys.c | 1429 const struct cred *cred = current_cred(), *tcred; check_prlimit_permission() local 1434 tcred = __task_cred(task); check_prlimit_permission() 1435 if (uid_eq(cred->uid, tcred->euid) && check_prlimit_permission() 1436 uid_eq(cred->uid, tcred->suid) && check_prlimit_permission() 1437 uid_eq(cred->uid, tcred->uid) && check_prlimit_permission() 1438 gid_eq(cred->gid, tcred->egid) && check_prlimit_permission() 1439 gid_eq(cred->gid, tcred->sgid) && check_prlimit_permission() 1440 gid_eq(cred->gid, tcred->gid)) check_prlimit_permission() 1442 if (ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) check_prlimit_permission()
|
H A D | signal.c | 695 const struct cred *tcred = __task_cred(t); kill_ok_by_cred() local 697 if (uid_eq(cred->euid, tcred->suid) || kill_ok_by_cred() 698 uid_eq(cred->euid, tcred->uid) || kill_ok_by_cred() 699 uid_eq(cred->uid, tcred->suid) || kill_ok_by_cred() 700 uid_eq(cred->uid, tcred->uid)) kill_ok_by_cred() 703 if (ns_capable(tcred->user_ns, CAP_KILL)) kill_ok_by_cred()
|
H A D | cgroup.c | 2679 const struct cred *tcred = get_task_cred(task); cgroup_procs_write_permission() local 2687 !uid_eq(cred->euid, tcred->uid) && cgroup_procs_write_permission() 2688 !uid_eq(cred->euid, tcred->suid)) cgroup_procs_write_permission() 2711 put_cred(tcred); cgroup_procs_write_permission()
|
/linux-4.4.14/mm/ |
H A D | migrate.c | 1484 const struct cred *cred = current_cred(), *tcred; SYSCALL_DEFINE6() local 1512 tcred = __task_cred(task); SYSCALL_DEFINE6() 1513 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE6() 1514 !uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) && SYSCALL_DEFINE6()
|
H A D | mempolicy.c | 1343 const struct cred *cred = current_cred(), *tcred; SYSCALL_DEFINE4() local 1384 tcred = __task_cred(task); SYSCALL_DEFINE4() 1385 if (!uid_eq(cred->euid, tcred->suid) && !uid_eq(cred->euid, tcred->uid) && SYSCALL_DEFINE4() 1386 !uid_eq(cred->uid, tcred->suid) && !uid_eq(cred->uid, tcred->uid) && SYSCALL_DEFINE4()
|
/linux-4.4.14/arch/ia64/kernel/ |
H A D | perfmon.c | 2361 const struct cred *tcred; pfm_bad_permissions() local 2367 tcred = __task_cred(task); pfm_bad_permissions() 2373 from_kuid(&init_user_ns, tcred->euid), pfm_bad_permissions() 2374 from_kuid(&init_user_ns, tcred->suid), pfm_bad_permissions() 2375 from_kuid(&init_user_ns, tcred->uid), pfm_bad_permissions() 2376 from_kgid(&init_user_ns, tcred->egid), pfm_bad_permissions() 2377 from_kgid(&init_user_ns, tcred->sgid))); pfm_bad_permissions() 2379 ret = ((!uid_eq(uid, tcred->euid)) pfm_bad_permissions() 2380 || (!uid_eq(uid, tcred->suid)) pfm_bad_permissions() 2381 || (!uid_eq(uid, tcred->uid)) pfm_bad_permissions() 2382 || (!gid_eq(gid, tcred->egid)) pfm_bad_permissions() 2383 || (!gid_eq(gid, tcred->sgid)) pfm_bad_permissions() 2384 || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); pfm_bad_permissions()
|