Lines Matching defs:old

384 	const struct cred *old;
400 old = current_cred();
404 if (gid_eq(old->gid, krgid) ||
405 gid_eq(old->egid, krgid) ||
406 ns_capable_setid(old->user_ns, CAP_SETGID))
412 if (gid_eq(old->gid, kegid) ||
413 gid_eq(old->egid, kegid) ||
414 gid_eq(old->sgid, kegid) ||
415 ns_capable_setid(old->user_ns, CAP_SETGID))
422 (egid != (gid_t) -1 && !gid_eq(kegid, old->gid)))
426 retval = security_task_fix_setgid(new, old, LSM_SETID_RE);
450 const struct cred *old;
462 old = current_cred();
465 if (ns_capable_setid(old->user_ns, CAP_SETGID))
467 else if (gid_eq(kgid, old->gid) || gid_eq(kgid, old->sgid))
472 retval = security_task_fix_setgid(new, old, LSM_SETID_ID);
541 const struct cred *old;
557 old = current_cred();
562 if (!uid_eq(old->uid, kruid) &&
563 !uid_eq(old->euid, kruid) &&
564 !ns_capable_setid(old->user_ns, CAP_SETUID))
570 if (!uid_eq(old->uid, keuid) &&
571 !uid_eq(old->euid, keuid) &&
572 !uid_eq(old->suid, keuid) &&
573 !ns_capable_setid(old->user_ns, CAP_SETUID))
577 if (!uid_eq(new->uid, old->uid)) {
583 (euid != (uid_t) -1 && !uid_eq(keuid, old->uid)))
587 retval = security_task_fix_setuid(new, old, LSM_SETID_RE);
622 const struct cred *old;
634 old = current_cred();
637 if (ns_capable_setid(old->user_ns, CAP_SETUID)) {
639 if (!uid_eq(kuid, old->uid)) {
644 } else if (!uid_eq(kuid, old->uid) && !uid_eq(kuid, new->suid)) {
650 retval = security_task_fix_setuid(new, old, LSM_SETID_ID);
679 const struct cred *old;
698 old = current_cred();
701 if ((ruid == (uid_t) -1 || uid_eq(kruid, old->uid)) &&
702 (euid == (uid_t) -1 || (uid_eq(keuid, old->euid) &&
703 uid_eq(keuid, old->fsuid))) &&
704 (suid == (uid_t) -1 || uid_eq(ksuid, old->suid)))
707 ruid_new = ruid != (uid_t) -1 && !uid_eq(kruid, old->uid) &&
708 !uid_eq(kruid, old->euid) && !uid_eq(kruid, old->suid);
709 euid_new = euid != (uid_t) -1 && !uid_eq(keuid, old->uid) &&
710 !uid_eq(keuid, old->euid) && !uid_eq(keuid, old->suid);
711 suid_new = suid != (uid_t) -1 && !uid_eq(ksuid, old->uid) &&
712 !uid_eq(ksuid, old->euid) && !uid_eq(ksuid, old->suid);
714 !ns_capable_setid(old->user_ns, CAP_SETUID))
723 if (!uid_eq(kruid, old->uid)) {
735 retval = security_task_fix_setuid(new, old, LSM_SETID_RES);
781 const struct cred *old;
798 old = current_cred();
801 if ((rgid == (gid_t) -1 || gid_eq(krgid, old->gid)) &&
802 (egid == (gid_t) -1 || (gid_eq(kegid, old->egid) &&
803 gid_eq(kegid, old->fsgid))) &&
804 (sgid == (gid_t) -1 || gid_eq(ksgid, old->sgid)))
807 rgid_new = rgid != (gid_t) -1 && !gid_eq(krgid, old->gid) &&
808 !gid_eq(krgid, old->egid) && !gid_eq(krgid, old->sgid);
809 egid_new = egid != (gid_t) -1 && !gid_eq(kegid, old->gid) &&
810 !gid_eq(kegid, old->egid) && !gid_eq(kegid, old->sgid);
811 sgid_new = sgid != (gid_t) -1 && !gid_eq(ksgid, old->gid) &&
812 !gid_eq(ksgid, old->egid) && !gid_eq(ksgid, old->sgid);
814 !ns_capable_setid(old->user_ns, CAP_SETGID))
829 retval = security_task_fix_setgid(new, old, LSM_SETID_RES);
874 const struct cred *old;
879 old = current_cred();
880 old_fsuid = from_kuid_munged(old->user_ns, old->fsuid);
882 kuid = make_kuid(old->user_ns, uid);
890 if (uid_eq(kuid, old->uid) || uid_eq(kuid, old->euid) ||
891 uid_eq(kuid, old->suid) || uid_eq(kuid, old->fsuid) ||
892 ns_capable_setid(old->user_ns, CAP_SETUID)) {
893 if (!uid_eq(kuid, old->fsuid)) {
895 if (security_task_fix_setuid(new, old, LSM_SETID_FS) == 0)
918 const struct cred *old;
923 old = current_cred();
924 old_fsgid = from_kgid_munged(old->user_ns, old->fsgid);
926 kgid = make_kgid(old->user_ns, gid);
934 if (gid_eq(kgid, old->gid) || gid_eq(kgid, old->egid) ||
935 gid_eq(kgid, old->sgid) || gid_eq(kgid, old->fsgid) ||
936 ns_capable_setid(old->user_ns, CAP_SETGID)) {
937 if (!gid_eq(kgid, old->fsgid)) {
939 if (security_task_fix_setgid(new,old,LSM_SETID_FS) == 0)
1698 struct rlimit old, new;
1728 old_rlim ? &old : NULL);
1731 rlim_to_rlim64(&old, &old64);
1759 * reads are atomic, we either get new values or old values and we don't