/linux-6.6.21/net/netfilter/ |
D | xt_owner.c | 90 if ((uid_gte(filp->f_cred->fsuid, uid_min) && in owner_mt() 91 uid_lte(filp->f_cred->fsuid, uid_max)) ^ in owner_mt() 102 struct group_info *gi = filp->f_cred->group_info; in owner_mt() 104 if (gid_gte(filp->f_cred->fsgid, gid_min) && in owner_mt() 105 gid_lte(filp->f_cred->fsgid, gid_max)) in owner_mt()
|
D | nft_meta.c | 150 sock->file->f_cred->fsuid); in nft_meta_get_eval_skugid() 154 sock->file->f_cred->fsgid); in nft_meta_get_eval_skugid()
|
/linux-6.6.21/security/safesetid/ |
D | securityfs.c | 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 59 rule->src_id.gid = make_kgid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 60 rule->dst_id.gid = make_kgid(file->f_cred->user_ns, parsed_child); in parse_policy_line()
|
/linux-6.6.21/fs/ |
D | file_table.c | 68 put_cred(f->f_cred); in file_free_rcu() 160 f->f_cred = get_cred(cred); in init_file() 163 put_cred(f->f_cred); in init_file()
|
/linux-6.6.21/include/rdma/ |
D | ib.h | 78 return filp->f_cred == current_cred(); in ib_safe_file_access()
|
/linux-6.6.21/kernel/ |
D | acct.c | 505 orig_cred = override_creds(file->f_cred); in do_acct_process() 516 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid); in do_acct_process() 517 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid); in do_acct_process()
|
D | capability.c | 460 if (security_capable(file->f_cred, ns, cap, CAP_OPT_NONE) == 0) in file_ns_capable()
|
D | user_namespace.c | 883 const struct user_namespace *file_ns = file->f_cred->user_ns; in verify_root_map() 1164 const struct cred *cred = file->f_cred; in new_idmap_permitted()
|
D | kallsyms.c | 921 iter->show_value = kallsyms_show_value(file->f_cred); in kallsyms_open()
|
/linux-6.6.21/fs/efivarfs/ |
D | file.c | 76 while (!__ratelimit(&file->f_cred->user->ratelimit)) in efivarfs_file_read()
|
/linux-6.6.21/kernel/module/ |
D | procfs.c | 133 m->private = kallsyms_show_value(file->f_cred) ? NULL : (void *)8ul; in modules_open()
|
D | sysfs.c | 55 kallsyms_show_value(file->f_cred) in module_sect_read()
|
/linux-6.6.21/net/sched/ |
D | cls_flow.c | 208 kuid_t skuid = sk->sk_socket->file->f_cred->fsuid; in flow_get_skuid() 220 kgid_t skgid = sk->sk_socket->file->f_cred->fsgid; in flow_get_skgid()
|
/linux-6.6.21/include/linux/ |
D | seq_file.h | 226 return seq->file->f_cred->user_ns; in seq_user_ns()
|
/linux-6.6.21/security/keys/ |
D | proc.c | 167 .cred = m->file->f_cred, in proc_keys_show()
|
/linux-6.6.21/fs/ecryptfs/ |
D | messaging.c | 109 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
|
/linux-6.6.21/fs/nfsd/ |
D | nfsctl.c | 407 rv = nfsd_svc(newthreads, net, file->f_cred); in write_threads() 778 return __write_ports_addfd(buf, net, file->f_cred); in __write_ports() 781 return __write_ports_addxprt(buf, net, file->f_cred); in __write_ports()
|
/linux-6.6.21/fs/coda/ |
D | file.c | 274 coda_flags, coda_file->f_cred->fsuid); in coda_release()
|
/linux-6.6.21/Documentation/security/ |
D | credentials.rst | 540 credentials and this is attached to the file struct as ``f_cred`` in place of 542 ``file->f_gid`` should now access ``file->f_cred->fsuid`` and 543 ``file->f_cred->fsgid``. 545 It is safe to access ``f_cred`` without the use of RCU or locking because the
|
/linux-6.6.21/fs/autofs/ |
D | waitq.c | 138 struct user_namespace *user_ns = sbi->pipe->f_cred->user_ns; in autofs_notify_daemon()
|
/linux-6.6.21/kernel/bpf/ |
D | syscall.c | 4227 const struct cred *f_cred) in bpf_insn_prepare_dump() argument 4253 if (!bpf_dump_raw_ok(f_cred)) in bpf_insn_prepare_dump() 4387 if (prog->blinded && !bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4391 insns_sanitized = bpf_insn_prepare_dump(prog, file->f_cred); in bpf_prog_get_info_by_fd() 4425 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4460 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4491 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4551 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd()
|
/linux-6.6.21/fs/fuse/ |
D | cuse.c | 511 fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns, in cuse_channel_open()
|
/linux-6.6.21/fs/orangefs/ |
D | devorangefs-req.c | 126 if (file->f_cred->user_ns != &init_user_ns) { in orangefs_devreq_open()
|
/linux-6.6.21/security/integrity/ima/ |
D | ima_crypto.c | 558 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash()
|
/linux-6.6.21/security/apparmor/ |
D | lsm.c | 470 label = aa_get_newest_cred_label(file->f_cred); in apparmor_file_open() 481 error = aa_path_perm(OP_OPEN, file->f_cred, in apparmor_file_open()
|