tcred 2313 arch/ia64/kernel/perfmon.c const struct cred *tcred; tcred 2319 arch/ia64/kernel/perfmon.c tcred = __task_cred(task); tcred 2325 arch/ia64/kernel/perfmon.c from_kuid(&init_user_ns, tcred->euid), tcred 2326 arch/ia64/kernel/perfmon.c from_kuid(&init_user_ns, tcred->suid), tcred 2327 arch/ia64/kernel/perfmon.c from_kuid(&init_user_ns, tcred->uid), tcred 2328 arch/ia64/kernel/perfmon.c from_kgid(&init_user_ns, tcred->egid), tcred 2329 arch/ia64/kernel/perfmon.c from_kgid(&init_user_ns, tcred->sgid))); tcred 2331 arch/ia64/kernel/perfmon.c ret = ((!uid_eq(uid, tcred->euid)) tcred 2332 arch/ia64/kernel/perfmon.c || (!uid_eq(uid, tcred->suid)) tcred 2333 arch/ia64/kernel/perfmon.c || (!uid_eq(uid, tcred->uid)) tcred 2334 arch/ia64/kernel/perfmon.c || (!gid_eq(gid, tcred->egid)) tcred 2335 arch/ia64/kernel/perfmon.c || (!gid_eq(gid, tcred->sgid)) tcred 2336 arch/ia64/kernel/perfmon.c || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); tcred 620 arch/x86/kernel/cpu/resctrl/rdtgroup.c const struct cred *tcred = get_task_cred(task); tcred 629 arch/x86/kernel/cpu/resctrl/rdtgroup.c !uid_eq(cred->euid, tcred->uid) && tcred 630 arch/x86/kernel/cpu/resctrl/rdtgroup.c !uid_eq(cred->euid, tcred->suid)) { tcred 635 arch/x86/kernel/cpu/resctrl/rdtgroup.c put_cred(tcred); tcred 40 block/ioprio.c const struct cred *cred = current_cred(), *tcred; tcred 43 block/ioprio.c tcred = __task_cred(task); tcred 44 block/ioprio.c if (!uid_eq(tcred->uid, cred->euid) && tcred 45 block/ioprio.c !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { tcred 1643 include/linux/lsm_hooks.h int (*task_prlimit)(const struct cred *cred, const struct cred *tcred, tcred 398 include/linux/security.h int security_task_prlimit(const struct cred *cred, const struct cred *tcred, tcred 1065 include/linux/security.h const struct cred *tcred, tcred 497 kernel/cgroup/cgroup-v1.c const struct cred *cred, *tcred; tcred 514 kernel/cgroup/cgroup-v1.c tcred = get_task_cred(task); tcred 516 kernel/cgroup/cgroup-v1.c !uid_eq(cred->euid, tcred->uid) && tcred 517 kernel/cgroup/cgroup-v1.c !uid_eq(cred->euid, tcred->suid)) tcred 519 kernel/cgroup/cgroup-v1.c put_cred(tcred); tcred 283 kernel/ptrace.c const struct cred *cred = current_cred(), *tcred; tcred 321 kernel/ptrace.c tcred = __task_cred(task); tcred 322 kernel/ptrace.c if (uid_eq(caller_uid, tcred->euid) && tcred 323 kernel/ptrace.c uid_eq(caller_uid, tcred->suid) && tcred 324 kernel/ptrace.c uid_eq(caller_uid, tcred->uid) && tcred 325 kernel/ptrace.c gid_eq(caller_gid, tcred->egid) && tcred 326 kernel/ptrace.c gid_eq(caller_gid, tcred->sgid) && tcred 327 kernel/ptrace.c gid_eq(caller_gid, tcred->gid)) tcred 329 kernel/ptrace.c if (ptrace_has_cap(cred, tcred->user_ns, mode)) tcred 814 kernel/signal.c const struct cred *tcred = __task_cred(t); tcred 816 kernel/signal.c return uid_eq(cred->euid, tcred->suid) || tcred 817 kernel/signal.c uid_eq(cred->euid, tcred->uid) || tcred 818 kernel/signal.c uid_eq(cred->uid, tcred->suid) || tcred 819 kernel/signal.c uid_eq(cred->uid, tcred->uid) || tcred 820 kernel/signal.c ns_capable(tcred->user_ns, CAP_KILL); tcred 1587 kernel/sys.c const struct cred *cred = current_cred(), *tcred; tcred 1593 kernel/sys.c tcred = __task_cred(task); tcred 1594 kernel/sys.c id_match = (uid_eq(cred->uid, tcred->euid) && tcred 1595 kernel/sys.c uid_eq(cred->uid, tcred->suid) && tcred 1596 kernel/sys.c uid_eq(cred->uid, tcred->uid) && tcred 1597 kernel/sys.c gid_eq(cred->gid, tcred->egid) && tcred 1598 kernel/sys.c gid_eq(cred->gid, tcred->sgid) && tcred 1599 kernel/sys.c gid_eq(cred->gid, tcred->gid)); tcred 1600 kernel/sys.c if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) tcred 1603 kernel/sys.c return security_task_prlimit(cred, tcred, flags); tcred 24 kernel/tsacct.c const struct cred *tcred; tcred 53 kernel/tsacct.c tcred = __task_cred(tsk); tcred 54 kernel/tsacct.c stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); tcred 55 kernel/tsacct.c stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); tcred 1674 security/security.c int security_task_prlimit(const struct cred *cred, const struct cred *tcred, tcred 1677 security/security.c return call_int_hook(task_prlimit, 0, cred, tcred, flags); tcred 4089 security/selinux/hooks.c static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, tcred 4101 security/selinux/hooks.c cred_sid(cred), cred_sid(tcred), tcred 1787 security/smack/smack_lsm.c const struct cred *tcred; tcred 1804 security/smack/smack_lsm.c tcred = __task_cred(tsk); tcred 1805 security/smack/smack_lsm.c if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred))