/linux-master/fs/smb/server/ |
H A D | ksmbd_work.h | 61 const struct cred *saved_cred;
|
/linux-master/include/linux/ |
H A D | user_namespace.h | 166 extern int create_user_ns(struct cred *new); 167 extern int unshare_userns(unsigned long unshare_flags, struct cred **new_cred); 197 static inline int create_user_ns(struct cred *new) 203 struct cred **new_cred)
|
H A D | nfs_xdr.h | 279 const struct cred *cred; member in struct:nfs4_layoutget 319 const struct cred *cred; member in struct:nfs4_layoutcommit_data 344 const struct cred *cred; member in struct:nfs4_layoutreturn 761 const struct cred *cred; member in struct:nfs_readdir_arg 1613 const struct cred *cred; member in struct:nfs_pgio_header 1676 const struct cred *cred; member in struct:nfs_commit_data 1707 const struct cred *cred; member in struct:nfs_unlinkdata 1716 const struct cred *cred; member in struct:nfs_renamedata [all...] |
H A D | fs_context.h | 17 struct cred; 99 const struct cred *cred; /* The mounter's credentials */ member in struct:fs_context
|
/linux-master/security/apparmor/include/ |
H A D | policy.h | 15 #include <linux/cred.h> 390 bool aa_policy_view_capable(const struct cred *subj_cred, 392 bool aa_policy_admin_capable(const struct cred *subj_cred, 394 int aa_may_manage_policy(const struct cred *subj_cred,
|
/linux-master/security/integrity/ |
H A D | digsig.c | 12 #include <linux/cred.h> 102 const struct cred *cred = current_cred(); local 106 KGIDT_INIT(0), cred, perm,
|
/linux-master/fs/nfs/ |
H A D | callback.c | 43 const struct cred *cred = current_cred(); local 49 cred); 58 cred);
|
H A D | unlink.c | 34 put_cred(data->cred); 94 .rpc_cred = data->cred, 186 data->cred = get_current_cred(); 207 put_cred(data->cred); 311 put_cred(data->cred); 362 data->cred = get_current_cred(); 366 msg.rpc_cred = data->cred;
|
/linux-master/fs/nfsd/ |
H A D | filecache.h | 35 const struct cred *nf_cred;
|
H A D | nfsd.h | 106 int nfsd_svc(int nrservs, struct net *net, const struct cred *cred, const char *scope); 163 const struct cred *cred = rqstp->rq_xprt->xpt_cred; local 164 return cred ? cred->user_ns : &init_user_ns;
|
/linux-master/security/landlock/ |
H A D | task.c | 10 #include <linux/cred.h> 18 #include "cred.h"
|
/linux-master/include/linux/sunrpc/ |
H A D | clnt.h | 81 const char * cl_principal; /* use for machine cred */ 93 const struct cred *cl_cred; 150 const struct cred *cred; member in struct:rpc_create_args 214 struct rpc_task *rpc_call_null(struct rpc_clnt *clnt, struct rpc_cred *cred,
|
/linux-master/crypto/asymmetric_keys/ |
H A D | selftest.c | 9 #include <linux/cred.h>
|
/linux-master/security/keys/ |
H A D | keyctl.c | 17 #include <linux/cred.h> 1152 struct cred *new; 1177 const struct cred *cred = current_cred(); local 1196 instkey = cred->request_key_auth; 1338 const struct cred *cred = current_cred(); local 1357 instkey = cred->request_key_auth; 1395 struct cred *new; 1629 const struct cred *mycre 1632 struct cred *cred; local [all...] |
/linux-master/fs/ |
H A D | coredump.c | 209 const struct cred *cred = current_cred(); local 288 cred->uid)); 294 cred->gid)); 504 static int umh_pipe_setup(struct subprocess_info *info, struct cred *new) 528 const struct cred *old_cred; 529 struct cred *cred; local 559 cred = prepare_creds(); 560 if (!cred) [all...] |
/linux-master/kernel/ |
H A D | utsname.c | 13 #include <linux/cred.h> 146 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN))
|
/linux-master/net/sunrpc/ |
H A D | auth_tls.c | 90 static void tls_destroy_cred(struct rpc_cred *cred) argument 94 static int tls_match(struct auth_cred *acred, struct rpc_cred *cred, int taskflags) argument
|
/linux-master/fs/lockd/ |
H A D | host.c | 63 const struct cred *cred; member in struct:nlm_lookup_host_info 165 host->h_cred = get_cred(ni->cred); 208 * @cred: pointer to cred 222 const struct cred *cred) 234 .cred = cred, 463 .cred 215 nlmclnt_lookup_host(const struct sockaddr *sap, const size_t salen, const unsigned short protocol, const u32 version, const char *hostname, int noresvport, struct net *net, const struct cred *cred) argument [all...] |
/linux-master/fs/quota/ |
H A D | netlink.c | 2 #include <linux/cred.h>
|
/linux-master/security/smack/ |
H A D | smack_access.c | 641 * smack_privileged_cred - are all privilege requirements met by cred 643 * @cred: the credential to use 650 bool smack_privileged_cred(int cap, const struct cred *cred) argument 652 struct task_smack *tsp = smack_cred(cred); 657 rc = cap_capable(cred, &init_user_ns, cap, CAP_OPT_NONE);
|
H A D | smack_lsm.c | 254 static int smk_bu_credfile(const struct cred *cred, struct file *file, argument 257 struct task_smack *tsp = smack_cred(cred); 280 #define smk_bu_credfile(cred, file, mode, RC) (RC) 437 const struct cred *tracercred; 913 * smack_bprm_creds_for_exec - Update bprm->cred if needed for exec 921 struct task_smack *bsp = smack_cred(bprm->cred); 1028 * should have overridden the current cred, so the 1919 struct smack_known *tkp = smk_of_task(smack_cred(tsk->cred)); 1920 const struct cred *tcre 2040 smack_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 2052 smack_cred_free(struct cred *cred) argument 2116 smack_cred_getsecid(const struct cred *cred, u32 *secid) argument 2321 smack_task_kill(struct task_struct *p, struct kernel_siginfo *info, int sig, const struct cred *cred) argument 4480 smack_key_alloc(struct key *key, const struct cred *cred, unsigned long flags) argument 4509 smack_key_permission(key_ref_t key_ref, const struct cred *cred, enum key_need_perm need_perm) argument 4651 smack_post_notification(const struct cred *w_cred, const struct cred *cred, struct watch_notification *n) argument 5224 struct cred *cred = (struct cred *) current->cred; local [all...] |
/linux-master/block/ |
H A D | blk-ioc.c | 254 const struct cred *cred = current_cred(), *tcred; local 258 if (!uid_eq(tcred->uid, cred->euid) && 259 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) {
|
/linux-master/security/apparmor/ |
H A D | domain.c | 23 #include "include/cred.h" 34 * @to_cred: cred of task changing domain 43 static int may_change_ptraced_domain(const struct cred *to_cred, 49 const struct cred *tracer_cred = NULL; 631 static struct aa_label *profile_transition(const struct cred *subj_cred, 733 static int profile_onexec(const struct cred *subj_cred, 809 static struct aa_label *handle_onexec(const struct cred *subj_cred, 877 const struct cred *subj_cred; 892 AA_BUG(!cred_label(bprm->cred)); 895 label = aa_get_newest_label(cred_label(bprm->cred)); [all...] |
H A D | net.c | 13 #include "include/cred.h" 138 int aa_af_perm(const struct cred *subj_cred, struct aa_label *label, 149 static int aa_label_sk_perm(const struct cred *subj_cred, 189 int aa_sock_file_perm(const struct cred *subj_cred, struct aa_label *label,
|
/linux-master/fs/overlayfs/ |
H A D | xattrs.c | 44 const struct cred *old_cred; 88 const struct cred *old_cred; 119 const struct cred *old_cred;
|