/linux-6.12.1/net/netfilter/ |
D | xt_owner.c | 90 if ((uid_gte(filp->f_cred->fsuid, uid_min) && in owner_mt() 91 uid_lte(filp->f_cred->fsuid, uid_max)) ^ in owner_mt() 102 struct group_info *gi = filp->f_cred->group_info; in owner_mt() 104 if (gid_gte(filp->f_cred->fsgid, gid_min) && in owner_mt() 105 gid_lte(filp->f_cred->fsgid, gid_max)) in owner_mt()
|
D | nft_meta.c | 150 sock->file->f_cred->fsuid); in nft_meta_get_eval_skugid() 154 sock->file->f_cred->fsgid); in nft_meta_get_eval_skugid()
|
/linux-6.12.1/security/safesetid/ |
D | securityfs.c | 54 rule->src_id.uid = make_kuid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 55 rule->dst_id.uid = make_kuid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 59 rule->src_id.gid = make_kgid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 60 rule->dst_id.gid = make_kgid(file->f_cred->user_ns, parsed_child); in parse_policy_line()
|
/linux-6.12.1/fs/ |
D | file_table.c | 68 put_cred(f->f_cred); in file_free() 152 f->f_cred = get_cred(cred); in init_file() 155 put_cred(f->f_cred); in init_file()
|
/linux-6.12.1/include/rdma/ |
D | ib.h | 78 return filp->f_cred == current_cred(); in ib_safe_file_access()
|
/linux-6.12.1/kernel/ |
D | acct.c | 504 orig_cred = override_creds(file->f_cred); in do_acct_process() 515 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid); in do_acct_process() 516 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid); in do_acct_process()
|
D | capability.c | 460 if (security_capable(file->f_cred, ns, cap, CAP_OPT_NONE) == 0) in file_ns_capable()
|
D | user_namespace.c | 885 const struct user_namespace *file_ns = file->f_cred->user_ns; in verify_root_map() 1166 const struct cred *cred = file->f_cred; in new_idmap_permitted()
|
D | kallsyms.c | 870 iter->show_value = kallsyms_show_value(file->f_cred); in kallsyms_open()
|
/linux-6.12.1/fs/efivarfs/ |
D | file.c | 76 while (!__ratelimit(&file->f_cred->user->ratelimit)) in efivarfs_file_read()
|
/linux-6.12.1/kernel/module/ |
D | procfs.c | 133 m->private = kallsyms_show_value(file->f_cred) ? NULL : (void *)8ul; in modules_open()
|
D | sysfs.c | 55 kallsyms_show_value(file->f_cred) in module_sect_read()
|
/linux-6.12.1/security/landlock/ |
D | task.c | 188 dom_other = landlock_cred(other->sk_socket->file->f_cred)->domain; in sock_is_scoped()
|
/linux-6.12.1/fs/nfs/ |
D | localio.c | 374 save_cred = override_creds(filp->f_cred); in nfs_local_call_read() 544 save_cred = override_creds(filp->f_cred); in nfs_local_call_write()
|
/linux-6.12.1/net/sched/ |
D | cls_flow.c | 208 kuid_t skuid = sk->sk_socket->file->f_cred->fsuid; in flow_get_skuid() 220 kgid_t skgid = sk->sk_socket->file->f_cred->fsgid; in flow_get_skgid()
|
/linux-6.12.1/fs/ecryptfs/ |
D | messaging.c | 109 if (uid_eq((*daemon)->file->f_cred->euid, current_euid())) { in ecryptfs_find_daemon_by_euid()
|
/linux-6.12.1/include/linux/ |
D | seq_file.h | 251 return seq->file->f_cred->user_ns; in seq_user_ns()
|
/linux-6.12.1/security/keys/ |
D | proc.c | 167 .cred = m->file->f_cred, in proc_keys_show()
|
/linux-6.12.1/Documentation/security/ |
D | credentials.rst | 540 credentials and this is attached to the file struct as ``f_cred`` in place of 542 ``file->f_gid`` should now access ``file->f_cred->fsuid`` and 543 ``file->f_cred->fsgid``. 545 It is safe to access ``f_cred`` without the use of RCU or locking because the
|
/linux-6.12.1/fs/coda/ |
D | file.c | 272 coda_flags, coda_file->f_cred->fsuid); in coda_release()
|
/linux-6.12.1/fs/autofs/ |
D | waitq.c | 138 struct user_namespace *user_ns = sbi->pipe->f_cred->user_ns; in autofs_notify_daemon()
|
/linux-6.12.1/fs/fuse/ |
D | cuse.c | 514 fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns, in cuse_channel_open()
|
/linux-6.12.1/fs/nfsd/ |
D | nfsctl.c | 417 rv = nfsd_svc(1, &newthreads, net, file->f_cred, NULL); in write_threads() 789 return __write_ports_addfd(buf, net, file->f_cred); in __write_ports() 792 return __write_ports_addxprt(buf, net, file->f_cred); in __write_ports()
|
/linux-6.12.1/fs/orangefs/ |
D | devorangefs-req.c | 126 if (file->f_cred->user_ns != &init_user_ns) { in orangefs_devreq_open()
|
/linux-6.12.1/kernel/bpf/ |
D | syscall.c | 4447 const struct cred *f_cred) in bpf_insn_prepare_dump() argument 4473 if (!bpf_dump_raw_ok(f_cred)) in bpf_insn_prepare_dump() 4613 if (prog->blinded && !bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4617 insns_sanitized = bpf_insn_prepare_dump(prog, file->f_cred); in bpf_prog_get_info_by_fd() 4651 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4686 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4717 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd() 4777 if (bpf_dump_raw_ok(file->f_cred)) { in bpf_prog_get_info_by_fd()
|