Searched refs:cred (Results 26 - 50 of 336) sorted by relevance

1234567891011>>

/linux-master/fs/cachefiles/
H A Dsecurity.c9 #include <linux/cred.h>
18 struct cred *new;
77 const struct cred **_saved_cred)
79 struct cred *new;
/linux-master/kernel/
H A Dgroups.c5 #include <linux/cred.h>
118 void set_groups(struct cred *new, struct group_info *group_info)
136 struct cred *new;
137 const struct cred *old;
163 const struct cred *cred = current_cred(); local
170 i = cred->group_info->ngroups;
176 if (groups_to_user(grouplist, cred->group_info)) {
229 const struct cred *cred local
241 const struct cred *cred = current_cred(); local
[all...]
/linux-master/security/apparmor/include/
H A Dcapability.h39 int aa_capable(const struct cred *subj_cred, struct aa_label *label,
H A Dfile.h74 int aa_audit_file(const struct cred *cred,
86 int aa_path_perm(const char *op, const struct cred *subj_cred,
90 int aa_path_link(const struct cred *subj_cred, struct aa_label *label,
94 int aa_file_perm(const char *op, const struct cred *subj_cred,
98 void aa_inherit_files(const struct cred *cred, struct files_struct *files);
H A Dresource.h36 int aa_task_setrlimit(const struct cred *subj_cred, struct aa_label *label,
/linux-master/security/
H A Dcommoncap.c54 * @cred: The credentials to use
67 int cap_capable(const struct cred *cred, struct user_namespace *targ_ns, argument
72 /* See if cred has the capability in the target user namespace
78 if (ns == cred->user_ns)
79 return cap_raised(cred->cap_effective, cap) ? 0 : -EPERM;
85 if (ns->level <= cred->user_ns->level)
92 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid))
138 const struct cred *cre local
175 const struct cred *cred, *child_cred; local
204 const struct cred *cred; local
768 __is_real(kuid_t uid, struct cred *cred) argument
771 __is_eff(kuid_t uid, struct cred *cred) argument
774 __is_suid(kuid_t uid, struct cred *cred) argument
[all...]
/linux-master/security/landlock/
H A DMakefile4 cred.o task.o fs.o
/linux-master/security/apparmor/
H A Dtask.c11 * cred or task context but instead creates a new one. Ideally the task
12 * should return to the previous cred if it has not been modified.
19 #include "include/cred.h"
50 struct cred *new;
78 * be careful switching cred label, when racing replacement it
79 * is possible that the cred labels's->proxy->label is the reference
81 * dropping the reference on the cred's label
120 struct cred *new;
160 struct cred *new;
226 static int profile_ptrace_perm(const struct cred *cre argument
243 profile_tracee_perm(const struct cred *cred, struct aa_profile *tracee, struct aa_label *tracer, u32 request, struct apparmor_audit_data *ad) argument
255 profile_tracer_perm(const struct cred *cred, struct aa_profile *tracer, struct aa_label *tracee, u32 request, struct apparmor_audit_data *ad) argument
[all...]
H A Dipc.c15 #include "include/cred.h"
78 static int profile_signal_perm(const struct cred *cred, argument
92 ad->subj_cred = cred;
103 int aa_may_signal(const struct cred *subj_cred, struct aa_label *sender,
104 const struct cred *target_cred, struct aa_label *target,
/linux-master/include/linux/
H A Dsecurity.h39 struct cred;
148 extern int cap_capable(const struct cred *cred, struct user_namespace *ns,
155 extern int cap_capset(struct cred *new, const struct cred *old,
172 extern int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags);
272 int security_binder_set_context_mgr(const struct cred *mgr);
273 int security_binder_transaction(const struct cred *from,
274 const struct cred *t
605 security_capable(const struct cred *cred, struct user_namespace *ns, int cap, unsigned int opts) argument
1123 security_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument
1128 security_cred_free(struct cred *cred) argument
1148 security_kernel_act_as(struct cred *cred, u32 secid) argument
1153 security_kernel_create_files_as(struct cred *cred, struct inode *inode) argument
1250 security_task_prlimit(const struct cred *cred, const struct cred *tcred, unsigned int flags) argument
1279 security_task_kill(struct task_struct *p, struct kernel_siginfo *info, int sig, const struct cred *cred) argument
1297 security_create_user_ns(const struct cred *cred) argument
1493 security_post_notification(const struct cred *w_cred, const struct cred *cred, struct watch_notification *n) argument
2014 security_key_alloc(struct key *key, const struct cred *cred, unsigned long flags) argument
2025 security_key_permission(key_ref_t key_ref, const struct cred *cred, enum key_need_perm need_perm) argument
[all...]
H A Dlsm_hook_defs.h29 LSM_HOOK(int, 0, binder_set_context_mgr, const struct cred *mgr)
30 LSM_HOOK(int, 0, binder_transaction, const struct cred *from,
31 const struct cred *to)
32 LSM_HOOK(int, 0, binder_transfer_binder, const struct cred *from,
33 const struct cred *to)
34 LSM_HOOK(int, 0, binder_transfer_file, const struct cred *from,
35 const struct cred *to, const struct file *file)
41 LSM_HOOK(int, 0, capset, struct cred *new, const struct cred *old,
44 LSM_HOOK(int, 0, capable, const struct cred *cre
[all...]
H A Dumh.h11 struct cred;
28 int (*init)(struct subprocess_info *info, struct cred *new);
39 int (*init)(struct subprocess_info *info, struct cred *new),
/linux-master/fs/nfs/
H A Dnfs4renewd.c60 const struct cred *cred; local
81 cred = ops->get_state_renewal_cred(clp);
82 if (cred == NULL) {
92 ret = ops->sched_state_renewal(clp, cred, renew_flags);
93 put_cred(cred);
H A Dnfs4_fs.h70 nfs4_stateid *, const struct cred *);
116 const struct cred *so_cred; /* Associated cred */
224 int (*establish_clid)(struct nfs_client *, const struct cred *);
225 int (*reclaim_complete)(struct nfs_client *, const struct cred *);
227 const struct cred *);
256 const struct cred *cred; member in struct:nfs4_add_xprt_data
260 int (*sched_state_renewal)(struct nfs_client *, const struct cred *, unsigned);
261 const struct cred * (*get_state_renewal_cre
[all...]
H A Dnfs4state.c113 int nfs4_init_clientid(struct nfs_client *clp, const struct cred *cred) argument
129 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid);
136 status = nfs4_proc_setclientid_confirm(clp, &clid, cred);
150 * @cred: credential to use for trunking test
160 const struct cred *cred)
174 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid);
180 status = nfs40_walk_client_list(clp, result, cred);
194 const struct cred *nfs4_get_machine_cre
158 nfs40_discover_server_trunking(struct nfs_client *clp, struct nfs_client **result, const struct cred *cred) argument
210 const struct cred *cred = NULL; local
235 const struct cred *cred = NULL; local
321 nfs41_init_clientid(struct nfs_client *clp, const struct cred *cred) argument
356 nfs41_discover_server_trunking(struct nfs_client *clp, struct nfs_client **result, const struct cred *cred) argument
400 const struct cred *cred; local
407 nfs4_find_state_owner_locked(struct nfs_server *server, const struct cred *cred) argument
495 nfs4_alloc_state_owner(struct nfs_server *server, const struct cred *cred, gfp_t gfp_flags) argument
576 nfs4_get_state_owner(struct nfs_server *server, const struct cred *cred, gfp_t gfp_flags) argument
1044 nfs4_select_rw_stateid(struct nfs4_state *state, fmode_t fmode, const struct nfs_lock_context *l_ctx, nfs4_stateid *dst, const struct cred **cred) argument
1808 nfs4_reclaim_complete(struct nfs_client *clp, const struct nfs4_state_recovery_ops *ops, const struct cred *cred) argument
1861 const struct cred *cred; local
1977 const struct cred *cred; local
2056 const struct cred *cred; local
2115 nfs4_try_migration(struct nfs_server *server, const struct cred *cred) argument
2196 const struct cred *cred; local
2242 const struct cred *cred; local
2298 const struct cred *cred; local
2504 const struct cred *cred; local
2548 const struct cred *cred; local
[all...]
/linux-master/fs/fuse/
H A Dpassthrough.c36 .cred = ff->cred,
64 .cred = ff->cred,
90 .cred = ff->cred,
111 .cred = ff->cred,
132 .cred = ff->cred,
[all...]
/linux-master/security/safesetid/
H A Dlsm.c91 static int safesetid_security_capable(const struct cred *cred, argument
114 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT)
121 __kuid_val(cred->uid));
128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
135 __kgid_val(cred->gid));
148 static bool id_permitted_for_cred(const struct cred *old, kid_t new_id, enum setid_type new_type)
187 * Check whether there is either an exception for user under old cred struct to
188 * set*uid to user under new cred struct, or the UID transition is allowed (by
191 static int safesetid_task_fix_setuid(struct cred *ne
[all...]
/linux-master/include/linux/sunrpc/
H A Dauth.h39 const struct cred *cred; member in struct:auth_cred
57 const struct cred *cr_cred;
66 const struct cred *rpc_machine_cred(void);
74 unsigned int au_cslack; /* call cred size estimate */
75 unsigned int au_rslack; /* reply cred size estimate */
101 #define RPCAUTH_LOOKUP_NEW 0x01 /* Accept an uninitialised cred */
190 struct rpc_cred *get_rpccred(struct rpc_cred *cred) argument
192 if (cred != NULL && refcount_inc_not_zero(&cred
[all...]
/linux-master/net/dns_resolver/
H A Dinternal.h36 extern const struct cred *dns_resolver_cache;
H A Ddns_key.c45 const struct cred *dns_resolver_cache;
337 struct cred *cred; local
347 cred = prepare_kernel_cred(&init_task);
348 if (!cred)
352 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, cred,
368 cred->thread_keyring = keyring;
369 cred->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING;
370 dns_resolver_cache = cred;
378 put_cred(cred);
[all...]
/linux-master/io_uring/
H A Dfdinfo.c20 const struct cred *cred)
28 seq_put_decimal_ull(m, "\tUid:\t", from_kuid_munged(uns, cred->uid));
29 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->euid));
30 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->suid));
31 seq_put_decimal_ull(m, "\t\t", from_kuid_munged(uns, cred->fsuid));
32 seq_put_decimal_ull(m, "\n\tGid:\t", from_kgid_munged(uns, cred->gid));
33 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->egid));
34 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred->sgid));
35 seq_put_decimal_ull(m, "\t\t", from_kgid_munged(uns, cred
19 io_uring_show_cred(struct seq_file *m, unsigned int id, const struct cred *cred) argument
186 const struct cred *cred; local
[all...]
/linux-master/fs/
H A Dbacking-file.c23 * @cred: credentials for open
34 const struct cred *cred)
39 f = alloc_empty_backing_file(flags, cred);
57 umode_t mode, const struct cred *cred)
63 f = alloc_empty_backing_file(flags, cred);
166 const struct cred *old_cred;
179 old_cred = override_creds(ctx->cred);
213 const struct cred *old_cre
32 backing_file_open(const struct path *user_path, int flags, const struct path *real_path, const struct cred *cred) argument
55 backing_tmpfile_open(const struct path *user_path, int flags, const struct path *real_parentpath, umode_t mode, const struct cred *cred) argument
[all...]
/linux-master/security/keys/
H A Drequest_key.c80 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) argument
84 return install_session_keyring_to_cred(cred, keyring);
122 const struct cred *cred = current_cred(); local
139 cred = get_current_cred();
140 keyring = keyring_alloc(desc, cred->fsuid, cred->fsgid, cred,
143 put_cred(cred);
268 const struct cred *cred = current_cred(); local
[all...]
/linux-master/net/sunrpc/auth_gss/
H A Dauth_gss.c133 gss_cred_set_ctx(struct rpc_cred *cred, struct gss_cl_ctx *ctx) argument
135 struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
137 if (!test_bit(RPCAUTH_CRED_NEW, &cred->cr_flags))
141 set_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
143 clear_bit(RPCAUTH_CRED_NEW, &cred->cr_flags);
147 gss_cred_get_ctx(struct rpc_cred *cred) argument
149 struct gss_cred *gss_cred = container_of(cred, struct gss_cred, gc_base);
406 const struct cred *cred)
408 struct user_namespace *userns = cred
405 gss_encode_v0_msg(struct gss_upcall_msg *gss_msg, const struct cred *cred) argument
430 gss_encode_v1_msg(struct gss_upcall_msg *gss_msg, const char *service_name, const char *target_name, const struct cred *cred) argument
562 gss_setup_upcall(struct gss_auth *gss_auth, struct rpc_cred *cred) argument
596 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local
646 struct rpc_cred *cred = &gss_cred->gc_base; local
1283 gss_send_destroy_context(struct rpc_cred *cred) argument
1344 gss_destroy_nullcred(struct rpc_cred *cred) argument
1359 gss_destroy_cred(struct rpc_cred *cred) argument
1386 struct gss_cred *cred = NULL; local
1408 gss_cred_init(struct rpc_auth *auth, struct rpc_cred *cred) argument
1421 gss_stringify_acceptor(struct rpc_cred *cred) argument
1538 struct rpc_cred *cred = req->rq_cred; local
1631 gss_cred_is_negative_entry(struct rpc_cred *cred) argument
1654 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local
1684 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local
1740 gss_wrap_req_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_task *task, struct xdr_stream *xdr) argument
1833 gss_wrap_req_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_task *task, struct xdr_stream *xdr) argument
1911 struct rpc_cred *cred = task->tk_rqstp->rq_cred; local
1951 gss_update_rslack(struct rpc_task *task, struct rpc_cred *cred, unsigned int before, unsigned int after) argument
1964 gss_unwrap_resp_auth(struct rpc_task *task, struct rpc_cred *cred) argument
1984 gss_unwrap_resp_integ(struct rpc_task *task, struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_rqst *rqstp, struct xdr_stream *xdr) argument
2056 gss_unwrap_resp_priv(struct rpc_task *task, struct rpc_cred *cred, struct gss_cl_ctx *ctx, struct rpc_rqst *rqstp, struct xdr_stream *xdr) argument
2113 struct rpc_cred *cred = req->rq_cred; local
2150 struct rpc_cred *cred = rqstp->rq_cred; local
[all...]
/linux-master/security/integrity/platform_certs/
H A Dplatform_keyring.c12 #include <linux/cred.h>

Completed in 190 milliseconds

1234567891011>>