/linux-master/fs/cachefiles/ |
H A D | security.c | 9 #include <linux/cred.h> 18 struct cred *new; 77 const struct cred **_saved_cred) 79 struct cred *new;
|
/linux-master/kernel/ |
H A D | groups.c | 5 #include <linux/cred.h> 118 void set_groups(struct cred *new, struct group_info *group_info) 136 struct cred *new; 137 const struct cred *old; 163 const struct cred *cred = current_cred(); local 170 i = cred->group_info->ngroups; 176 if (groups_to_user(grouplist, cred->group_info)) { 229 const struct cred *cred local 241 const struct cred *cred = current_cred(); local [all...] |
/linux-master/security/apparmor/include/ |
H A D | capability.h | 39 int aa_capable(const struct cred *subj_cred, struct aa_label *label,
|
H A D | file.h | 74 int aa_audit_file(const struct cred *cred, 86 int aa_path_perm(const char *op, const struct cred *subj_cred, 90 int aa_path_link(const struct cred *subj_cred, struct aa_label *label, 94 int aa_file_perm(const char *op, const struct cred *subj_cred, 98 void aa_inherit_files(const struct cred *cred, struct files_struct *files);
|
H A D | resource.h | 36 int aa_task_setrlimit(const struct cred *subj_cred, struct aa_label *label,
|
/linux-master/security/ |
H A D | commoncap.c | 54 * @cred: The credentials to use 67 int cap_capable(const struct cred *cred, struct user_namespace *targ_ns, argument 72 /* See if cred has the capability in the target user namespace 78 if (ns == cred->user_ns) 79 return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM; 85 if (ns->level <= cred->user_ns->level) 92 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) 138 const struct cred *cre local 175 const struct cred *cred, *child_cred; local 204 const struct cred *cred; local 768 __is_real(kuid_t uid, struct cred *cred) argument 771 __is_eff(kuid_t uid, struct cred *cred) argument 774 __is_suid(kuid_t uid, struct cred *cred) argument [all...] |
/linux-master/security/landlock/ |
H A D | Makefile | 4 cred.o task.o fs.o
|
/linux-master/security/apparmor/ |
H A D | task.c | 11 * cred or task context but instead creates a new one. Ideally the task 12 * should return to the previous cred if it has not been modified. 19 #include "include/cred.h" 50 struct cred *new; 78 * be careful switching cred label, when racing replacement it 79 * is possible that the cred labels's->proxy->label is the reference 81 * dropping the reference on the cred's label 120 struct cred *new; 160 struct cred *new; 226 static int profile_ptrace_perm(const struct cred *cre argument 243 profile_tracee_perm(const struct cred *cred, struct aa_profile *tracee, struct aa_label *tracer, u32 request, struct apparmor_audit_data *ad) argument 255 profile_tracer_perm(const struct cred *cred, struct aa_profile *tracer, struct aa_label *tracee, u32 request, struct apparmor_audit_data *ad) argument [all...] |
H A D | ipc.c | 15 #include "include/cred.h" 78 static int profile_signal_perm(const struct cred *cred, argument 92 ad->subj_cred = cred; 103 int aa_may_signal(const struct cred *subj_cred, struct aa_label *sender, 104 const struct cred *target_cred, struct aa_label *target,
|
/linux-master/include/linux/ |
H A D | security.h | 39 struct cred; 148 extern int cap_capable(const struct cred *cred, struct user_namespace *ns, 155 extern int cap_capset(struct cred *new, const struct cred *old, 172 extern int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags); 272 int security_binder_set_context_mgr(const struct cred *mgr); 273 int security_binder_transaction(const struct cred *from, 274 const struct cred *t 605 security_capable(const struct cred *cred, struct user_namespace *ns, int cap, unsigned int opts) argument 1123 security_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 1128 security_cred_free(struct cred *cred) argument 1148 security_kernel_act_as(struct cred *cred, u32 secid) argument 1153 security_kernel_create_files_as(struct cred *cred, struct inode *inode) argument 1250 security_task_prlimit(const struct cred *cred, const struct cred *tcred, unsigned int flags) argument 1279 security_task_kill(struct task_struct *p, struct kernel_siginfo *info, int sig, const struct cred *cred) argument 1297 security_create_user_ns(const struct cred *cred) argument 1493 security_post_notification(const struct cred *w_cred, const struct cred *cred, struct watch_notification *n) argument 2014 security_key_alloc(struct key *key, const struct cred *cred, unsigned long flags) argument 2025 security_key_permission(key_ref_t key_ref, const struct cred *cred, enum key_need_perm need_perm) argument [all...] |
H A D | lsm_hook_defs.h | 29 LSM_HOOK(int, 0, binder_set_context_mgr, const struct cred *mgr) 30 LSM_HOOK(int, 0, binder_transaction, const struct cred *from, 31 const struct cred *to) 32 LSM_HOOK(int, 0, binder_transfer_binder, const struct cred *from, 33 const struct cred *to) 34 LSM_HOOK(int, 0, binder_transfer_file, const struct cred *from, 35 const struct cred *to, const struct file *file) 41 LSM_HOOK(int, 0, capset, struct cred *new, const struct cred *old, 44 LSM_HOOK(int, 0, capable, const struct cred *cre [all...] |
H A D | umh.h | 11 struct cred; 28 int (*init)(struct subprocess_info *info, struct cred *new); 39 int (*init)(struct subprocess_info *info, struct cred *new),
|
/linux-master/fs/nfs/ |
H A D | nfs4renewd.c | 60 const struct cred *cred; local 81 cred = ops->get_state_renewal_cred(clp); 82 if (cred == NULL) { 92 ret = ops->sched_state_renewal(clp, cred, renew_flags); 93 put_cred(cred);
|
H A D | nfs4_fs.h | 70 nfs4_stateid *, const struct cred *); 116 const struct cred *so_cred; /* Associated cred */ 224 int (*establish_clid)(struct nfs_client *, const struct cred *); 225 int (*reclaim_complete)(struct nfs_client *, const struct cred *); 227 const struct cred *); 256 const struct cred *cred; member in struct:nfs4_add_xprt_data 260 int (*sched_state_renewal)(struct nfs_client *, const struct cred *, unsigned); 261 const struct cred * (*get_state_renewal_cre [all...] |
H A D | nfs4state.c | 113 int nfs4_init_clientid(struct nfs_client *clp, const struct cred *cred) argument 129 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid); 136 status = nfs4_proc_setclientid_confirm(clp, &clid, cred); 150 * @cred: credential to use for trunking test 160 const struct cred *cred) 174 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid); 180 status = nfs40_walk_client_list(clp, result, cred); 194 const struct cred *nfs4_get_machine_cre 158 nfs40_discover_server_trunking(struct nfs_client *clp, struct nfs_client **result, const struct cred *cred) argument 210 const struct cred *cred = NULL; local 235 const struct cred *cred = NULL; local 321 nfs41_init_clientid(struct nfs_client *clp, const struct cred *cred) argument 356 nfs41_discover_server_trunking(struct nfs_client *clp, struct nfs_client **result, const struct cred *cred) argument 400 const struct cred *cred; local 407 nfs4_find_state_owner_locked(struct nfs_server *server, const struct cred *cred) argument 495 nfs4_alloc_state_owner(struct nfs_server *server, const struct cred *cred, gfp_t gfp_flags) argument 576 nfs4_get_state_owner(struct nfs_server *server, const struct cred *cred, gfp_t gfp_flags) argument 1044 nfs4_select_rw_stateid(struct nfs4_state *state, fmode_t fmode, const struct nfs_lock_context *l_ctx, nfs4_stateid *dst, const struct cred **cred) argument 1808 nfs4_reclaim_complete(struct nfs_client *clp, const struct nfs4_state_recovery_ops *ops, const struct cred *cred) argument 1861 const struct cred *cred; local 1977 const struct cred *cred; local 2056 const struct cred *cred; local 2115 nfs4_try_migration(struct nfs_server *server, const struct cred *cred) argument 2196 const struct cred *cred; local 2242 const struct cred *cred; local 2298 const struct cred *cred; local 2504 const struct cred *cred; local 2548 const struct cred *cred; local [all...] |
/linux-master/fs/fuse/ |
H A D | passthrough.c | 36 .cred = ff->cred, 64 .cred = ff->cred, 90 .cred = ff->cred, 111 .cred = ff->cred, 132 .cred = ff->cred, [all...] |
/linux-master/security/safesetid/ |
H A D | lsm.c | 91 static int safesetid_security_capable(const struct cred *cred, argument 114 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) 121 __kuid_val(cred->uid)); 128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) 135 __kgid_val(cred->gid)); 148 static bool id_permitted_for_cred(const struct cred *old, kid_t new_id, enum setid_type new_type) 187 * Check whether there is either an exception for user under old cred struct to 188 * set*uid to user under new cred struct, or the UID transition is allowed (by 191 static int safesetid_task_fix_setuid(struct cred *ne [all...] |
/linux-master/include/linux/sunrpc/ |
H A D | auth.h | 39 const struct cred *cred; member in struct:auth_cred 57 const struct cred *cr_cred; 66 const struct cred *rpc_machine_cred(void); 74 unsigned int au_cslack; /* call cred size estimate */ 75 unsigned int au_rslack; /* reply cred size estimate */ 101 #define RPCAUTH_LOOKUP_NEW 0x01 /* Accept an uninitialised cred */ 190 struct rpc_cred *get_rpccred(struct rpc_cred *cred) argument 192 if (cred != NULL && refcount_inc_not_zero(&cred [all...] |
/linux-master/net/dns_resolver/ |
H A D | internal.h | 36 extern const struct cred *dns_resolver_cache;
|
H A D | dns_key.c | 45 const struct cred *dns_resolver_cache; 337 struct cred *cred; local 347 cred = prepare_kernel_cred(&init_task); 348 if (!cred) 352 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, cred, 368 cred->thread_keyring = keyring; 369 cred->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING; 370 dns_resolver_cache = cred; 378 put_cred(cred); [all...] |
/linux-master/io_uring/ |
H A D | fdinfo.c | 20 const struct cred *cred) 28 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid)); 29 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid)); 30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid)); 31 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid)); 32 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid)); 33 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid)); 34 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid)); 35 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred 19 io_uring_show_cred(struct seq_file *m, unsigned int id, const struct cred *cred) argument 186 const struct cred *cred; local [all...] |
/linux-master/fs/ |
H A D | backing-file.c | 23 * @cred: credentials for open 34 const struct cred *cred) 39 f = alloc_empty_backing_file(flags, cred); 57 umode_t mode, const struct cred *cred) 63 f = alloc_empty_backing_file(flags, cred); 166 const struct cred *old_cred; 179 old_cred = override_creds(ctx->cred); 213 const struct cred *old_cre 32 backing_file_open(const struct path *user_path, int flags, const struct path *real_path, const struct cred *cred) argument 55 backing_tmpfile_open(const struct path *user_path, int flags, const struct path *real_parentpath, umode_t mode, const struct cred *cred) argument [all...] |
/linux-master/security/keys/ |
H A D | request_key.c | 80 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) argument 84 return install_session_keyring_to_cred(cred, keyring); 122 const struct cred *cred = current_cred(); local 139 cred = get_current_cred(); 140 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred, 143 put_cred(cred); 268 const struct cred *cred = current_cred(); local [all...] |
/linux-master/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 133 gss_cred_set_ctx(struct rpc_cred *cred, struct gss_cl_ctx *ctx) argument 135 struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base); 137 if (!test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags)) 141 set_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags); 143 clear_bit(RPCAUTH_CRED_NEW, &cred->cr_flags); 147 gss_cred_get_ctx(struct rpc_cred *cred) argument 149 struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base); 406 const struct cred *cred) 408 struct user_namespace *userns = cred 405 gss_encode_v0_msg(struct gss_upcall_msg *gss_msg, const struct cred *cred) argument 430 gss_encode_v1_msg(struct gss_upcall_msg *gss_msg, const char *service_name, const char *target_name, const struct cred *cred) argument 562 gss_setup_upcall(struct gss_auth *gss_auth, struct rpc_cred *cred) argument 596 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local 646 struct rpc_cred *cred = &gss_cred->gc_base; local 1283 gss_send_destroy_context(struct rpc_cred *cred) argument 1344 gss_destroy_nullcred(struct rpc_cred *cred) argument 1359 gss_destroy_cred(struct rpc_cred *cred) argument 1386 struct gss_cred *cred = NULL; local 1408 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) argument 1421 gss_stringify_acceptor(struct rpc_cred *cred) argument 1538 struct rpc_cred *cred = req->rq_cred; local 1631 gss_cred_is_negative_entry(struct rpc_cred *cred) argument 1654 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local 1684 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local 1740 gss_wrap_req_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_task *task, struct xdr_stream *xdr) argument 1833 gss_wrap_req_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_task *task, struct xdr_stream *xdr) argument 1911 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local 1951 gss_update_rslack(struct rpc_task *task, struct rpc_cred *cred, unsigned int before, unsigned int after) argument 1964 gss_unwrap_resp_auth(struct rpc_task *task, struct rpc_cred *cred) argument 1984 gss_unwrap_resp_integ(struct rpc_task *task, struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_rqst *rqstp, struct xdr_stream *xdr) argument 2056 gss_unwrap_resp_priv(struct rpc_task *task, struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_rqst *rqstp, struct xdr_stream *xdr) argument 2113 struct rpc_cred *cred = req->rq_cred; local 2150 struct rpc_cred *cred = rqstp->rq_cred; local [all...] |
/linux-master/security/integrity/platform_certs/ |
H A D | platform_keyring.c | 12 #include <linux/cred.h>
|