Lines Matching refs:cred
77 const struct cred *cred = current_cred();
82 uid_t uid = from_kuid(user_ns, cred->user->uid);
106 uid_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID,
107 cred, user_keyring_perm,
128 session_keyring = keyring_alloc(buf, cred->user->uid, INVALID_GID,
129 cred, user_keyring_perm,
185 struct key *get_user_session_keyring_rcu(const struct cred *cred)
187 struct key *reg_keyring = READ_ONCE(cred->user_ns->user_keyring_register);
194 .cred = cred,
205 from_kuid(cred->user_ns,
206 cred->user->uid));
221 int install_thread_keyring_to_cred(struct cred *new)
246 struct cred *new;
268 int install_process_keyring_to_cred(struct cred *new)
293 struct cred *new;
313 * @cred can not be in use by any task yet.
317 int install_session_keyring_to_cred(struct cred *cred, struct key *keyring)
327 if (cred->session_keyring)
330 keyring = keyring_alloc("_ses", cred->uid, cred->gid, cred,
340 old = cred->session_keyring;
341 cred->session_keyring = keyring;
358 struct cred *new;
377 void key_fsuid_changed(struct cred *new_cred)
390 void key_fsgid_changed(struct cred *new_cred)
401 * Search the process keyrings attached to the supplied cred for the first
426 const struct cred *cred = ctx->cred;
440 if (cred->thread_keyring) {
442 make_key_ref(cred->thread_keyring, 1), ctx);
458 if (cred->process_keyring) {
460 make_key_ref(cred->process_keyring, 1), ctx);
479 if (cred->session_keyring) {
481 make_key_ref(cred->session_keyring, 1), ctx);
500 else if ((user_session = get_user_session_keyring_rcu(cred))) {
530 * Search the process keyrings attached to the supplied cred for the first
553 if (ctx->cred->request_key_auth &&
554 ctx->cred == current_cred() &&
557 const struct cred *cred = ctx->cred;
559 if (key_validate(cred->request_key_auth) == 0) {
560 rka = ctx->cred->request_key_auth->payload.data[0];
563 ctx->cred = rka->cred;
565 ctx->cred = cred;
626 ctx.cred = get_current_cred();
631 if (!ctx.cred->thread_keyring) {
643 key = ctx.cred->thread_keyring;
649 if (!ctx.cred->process_keyring) {
661 key = ctx.cred->process_keyring;
667 if (!ctx.cred->session_keyring) {
683 &ctx.cred->session_keyring->flags) &&
691 key = ctx.cred->session_keyring;
716 key = ctx.cred->request_key_auth;
725 if (!ctx.cred->request_key_auth)
728 down_read(&ctx.cred->request_key_auth->sem);
730 &ctx.cred->request_key_auth->flags)) {
734 rka = ctx.cred->request_key_auth->payload.data[0];
738 up_read(&ctx.cred->request_key_auth->sem);
803 ret = key_task_permission(key_ref, ctx.cred, need_perm);
810 put_cred(ctx.cred);
821 put_cred(ctx.cred);
839 const struct cred *old;
840 struct cred *new;
913 const struct cred *old = current_cred();
914 struct cred *new = container_of(twork, struct cred, rcu);