/kernel/linux/linux-5.10/block/ |
H A D | ioprio.c | 40 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio() local 43 tcred = __task_cred(task); in set_task_ioprio() 44 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio() 45 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { in set_task_ioprio()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | tsacct.c | 24 const struct cred *tcred; in bacct_add_tsk() local 55 tcred = __task_cred(tsk); in bacct_add_tsk() 56 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk() 57 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
|
H A D | ptrace.c | 293 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local 331 tcred = __task_cred(task); in __ptrace_may_access() 332 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access() 333 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access() 334 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access() 335 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access() 336 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access() 337 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access() 339 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
|
H A D | sys.c | 1617 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local 1623 tcred = __task_cred(task); in check_prlimit_permission() 1624 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission() 1625 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission() 1626 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission() 1627 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission() 1628 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission() 1629 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission() 1630 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission() 1633 return security_task_prlimit(cred, tcred, flag in check_prlimit_permission() [all...] |
H A D | signal.c | 815 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local 817 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 818 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred() 819 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 820 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred() 821 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | tsacct.c | 24 const struct cred *tcred; in bacct_add_tsk() local 61 tcred = __task_cred(tsk); in bacct_add_tsk() 62 stats->ac_uid = from_kuid_munged(user_ns, tcred->uid); in bacct_add_tsk() 63 stats->ac_gid = from_kgid_munged(user_ns, tcred->gid); in bacct_add_tsk()
|
H A D | ptrace.c | 289 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access() local 327 tcred = __task_cred(task); in __ptrace_may_access() 328 if (uid_eq(caller_uid, tcred->euid) && in __ptrace_may_access() 329 uid_eq(caller_uid, tcred->suid) && in __ptrace_may_access() 330 uid_eq(caller_uid, tcred->uid) && in __ptrace_may_access() 331 gid_eq(caller_gid, tcred->egid) && in __ptrace_may_access() 332 gid_eq(caller_gid, tcred->sgid) && in __ptrace_may_access() 333 gid_eq(caller_gid, tcred->gid)) in __ptrace_may_access() 335 if (ptrace_has_cap(tcred->user_ns, mode)) in __ptrace_may_access()
|
H A D | sys.c | 1665 const struct cred *cred = current_cred(), *tcred; in check_prlimit_permission() local 1671 tcred = __task_cred(task); in check_prlimit_permission() 1672 id_match = (uid_eq(cred->uid, tcred->euid) && in check_prlimit_permission() 1673 uid_eq(cred->uid, tcred->suid) && in check_prlimit_permission() 1674 uid_eq(cred->uid, tcred->uid) && in check_prlimit_permission() 1675 gid_eq(cred->gid, tcred->egid) && in check_prlimit_permission() 1676 gid_eq(cred->gid, tcred->sgid) && in check_prlimit_permission() 1677 gid_eq(cred->gid, tcred->gid)); in check_prlimit_permission() 1678 if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE)) in check_prlimit_permission() 1681 return security_task_prlimit(cred, tcred, flag in check_prlimit_permission() [all...] |
H A D | signal.c | 827 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() local 829 return uid_eq(cred->euid, tcred->suid) || in kill_ok_by_cred() 830 uid_eq(cred->euid, tcred->uid) || in kill_ok_by_cred() 831 uid_eq(cred->uid, tcred->suid) || in kill_ok_by_cred() 832 uid_eq(cred->uid, tcred->uid) || in kill_ok_by_cred() 833 ns_capable(tcred->user_ns, CAP_KILL); in kill_ok_by_cred()
|
/kernel/linux/linux-6.6/block/ |
H A D | blk-ioc.c | 254 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio() local 257 tcred = __task_cred(task); in set_task_ioprio() 258 if (!uid_eq(tcred->uid, cred->euid) && in set_task_ioprio() 259 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) { in set_task_ioprio()
|
/kernel/linux/linux-5.10/kernel/cgroup/ |
H A D | cgroup-v1.c | 495 const struct cred *cred, *tcred; in __cgroup1_procs_write() local 514 tcred = get_task_cred(task); in __cgroup1_procs_write() 521 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 522 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write() 524 put_cred(tcred); in __cgroup1_procs_write()
|
/kernel/linux/linux-6.6/kernel/cgroup/ |
H A D | cgroup-v1.c | 494 const struct cred *cred, *tcred; in __cgroup1_procs_write() local 513 tcred = get_task_cred(task); in __cgroup1_procs_write() 520 !uid_eq(cred->euid, tcred->uid) && in __cgroup1_procs_write() 521 !uid_eq(cred->euid, tcred->suid)) in __cgroup1_procs_write() 523 put_cred(tcred); in __cgroup1_procs_write()
|
/kernel/linux/linux-5.10/arch/x86/kernel/cpu/resctrl/ |
H A D | rdtgroup.c | 636 const struct cred *tcred = get_task_cred(task); in rdtgroup_task_write_permission() local 645 !uid_eq(cred->euid, tcred->uid) && in rdtgroup_task_write_permission() 646 !uid_eq(cred->euid, tcred->suid)) { in rdtgroup_task_write_permission() 651 put_cred(tcred); in rdtgroup_task_write_permission()
|
/kernel/linux/linux-6.6/arch/x86/kernel/cpu/resctrl/ |
H A D | rdtgroup.c | 647 const struct cred *tcred = get_task_cred(task); in rdtgroup_task_write_permission() local 656 !uid_eq(cred->euid, tcred->uid) && in rdtgroup_task_write_permission() 657 !uid_eq(cred->euid, tcred->suid)) { in rdtgroup_task_write_permission() 662 put_cred(tcred); in rdtgroup_task_write_permission()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | security.h | 414 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, 1114 const struct cred *tcred, in security_task_prlimit() 1113 security_task_prlimit(const struct cred *cred, const struct cred *tcred, unsigned int flags) security_task_prlimit() argument
|
/kernel/linux/linux-5.10/security/ |
H A D | security.c | 1808 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument 1811 return call_int_hook(task_prlimit, 0, cred, tcred, flags); in security_task_prlimit()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | security.h | 438 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, 1192 const struct cred *tcred, in security_task_prlimit() 1191 security_task_prlimit(const struct cred *cred, const struct cred *tcred, unsigned int flags) security_task_prlimit() argument
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_lsm.c | 1806 const struct cred *tcred; in smack_file_send_sigiotask() local 1823 tcred = __task_cred(tsk); in smack_file_send_sigiotask() 1824 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask()
|
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_lsm.c | 1911 const struct cred *tcred; in smack_file_send_sigiotask() local 1928 tcred = __task_cred(tsk); in smack_file_send_sigiotask() 1929 if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred)) in smack_file_send_sigiotask()
|
/kernel/linux/linux-6.6/security/ |
H A D | security.c | 3323 * @tcred: target task credentials 3331 int security_task_prlimit(const struct cred *cred, const struct cred *tcred, in security_task_prlimit() argument 3334 return call_int_hook(task_prlimit, 0, cred, tcred, flags); in security_task_prlimit()
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | hooks.c | 4134 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument 4146 cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | hooks.c | 4176 static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred, in selinux_task_prlimit() argument 4187 return avc_has_perm(cred_sid(cred), cred_sid(tcred), in selinux_task_prlimit()
|