tcred            2313 arch/ia64/kernel/perfmon.c 	const struct cred *tcred;
tcred            2319 arch/ia64/kernel/perfmon.c 	tcred = __task_cred(task);
tcred            2325 arch/ia64/kernel/perfmon.c 		from_kuid(&init_user_ns, tcred->euid),
tcred            2326 arch/ia64/kernel/perfmon.c 		from_kuid(&init_user_ns, tcred->suid),
tcred            2327 arch/ia64/kernel/perfmon.c 		from_kuid(&init_user_ns, tcred->uid),
tcred            2328 arch/ia64/kernel/perfmon.c 		from_kgid(&init_user_ns, tcred->egid),
tcred            2329 arch/ia64/kernel/perfmon.c 		from_kgid(&init_user_ns, tcred->sgid)));
tcred            2331 arch/ia64/kernel/perfmon.c 	ret = ((!uid_eq(uid, tcred->euid))
tcred            2332 arch/ia64/kernel/perfmon.c 	       || (!uid_eq(uid, tcred->suid))
tcred            2333 arch/ia64/kernel/perfmon.c 	       || (!uid_eq(uid, tcred->uid))
tcred            2334 arch/ia64/kernel/perfmon.c 	       || (!gid_eq(gid, tcred->egid))
tcred            2335 arch/ia64/kernel/perfmon.c 	       || (!gid_eq(gid, tcred->sgid))
tcred            2336 arch/ia64/kernel/perfmon.c 	       || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE);
tcred             620 arch/x86/kernel/cpu/resctrl/rdtgroup.c 	const struct cred *tcred = get_task_cred(task);
tcred             629 arch/x86/kernel/cpu/resctrl/rdtgroup.c 	    !uid_eq(cred->euid, tcred->uid) &&
tcred             630 arch/x86/kernel/cpu/resctrl/rdtgroup.c 	    !uid_eq(cred->euid, tcred->suid)) {
tcred             635 arch/x86/kernel/cpu/resctrl/rdtgroup.c 	put_cred(tcred);
tcred              40 block/ioprio.c 	const struct cred *cred = current_cred(), *tcred;
tcred              43 block/ioprio.c 	tcred = __task_cred(task);
tcred              44 block/ioprio.c 	if (!uid_eq(tcred->uid, cred->euid) &&
tcred              45 block/ioprio.c 	    !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) {
tcred            1643 include/linux/lsm_hooks.h 	int (*task_prlimit)(const struct cred *cred, const struct cred *tcred,
tcred             398 include/linux/security.h int security_task_prlimit(const struct cred *cred, const struct cred *tcred,
tcred            1065 include/linux/security.h 					const struct cred *tcred,
tcred             497 kernel/cgroup/cgroup-v1.c 	const struct cred *cred, *tcred;
tcred             514 kernel/cgroup/cgroup-v1.c 	tcred = get_task_cred(task);
tcred             516 kernel/cgroup/cgroup-v1.c 	    !uid_eq(cred->euid, tcred->uid) &&
tcred             517 kernel/cgroup/cgroup-v1.c 	    !uid_eq(cred->euid, tcred->suid))
tcred             519 kernel/cgroup/cgroup-v1.c 	put_cred(tcred);
tcred             283 kernel/ptrace.c 	const struct cred *cred = current_cred(), *tcred;
tcred             321 kernel/ptrace.c 	tcred = __task_cred(task);
tcred             322 kernel/ptrace.c 	if (uid_eq(caller_uid, tcred->euid) &&
tcred             323 kernel/ptrace.c 	    uid_eq(caller_uid, tcred->suid) &&
tcred             324 kernel/ptrace.c 	    uid_eq(caller_uid, tcred->uid)  &&
tcred             325 kernel/ptrace.c 	    gid_eq(caller_gid, tcred->egid) &&
tcred             326 kernel/ptrace.c 	    gid_eq(caller_gid, tcred->sgid) &&
tcred             327 kernel/ptrace.c 	    gid_eq(caller_gid, tcred->gid))
tcred             329 kernel/ptrace.c 	if (ptrace_has_cap(cred, tcred->user_ns, mode))
tcred             814 kernel/signal.c 	const struct cred *tcred = __task_cred(t);
tcred             816 kernel/signal.c 	return uid_eq(cred->euid, tcred->suid) ||
tcred             817 kernel/signal.c 	       uid_eq(cred->euid, tcred->uid) ||
tcred             818 kernel/signal.c 	       uid_eq(cred->uid, tcred->suid) ||
tcred             819 kernel/signal.c 	       uid_eq(cred->uid, tcred->uid) ||
tcred             820 kernel/signal.c 	       ns_capable(tcred->user_ns, CAP_KILL);
tcred            1587 kernel/sys.c   	const struct cred *cred = current_cred(), *tcred;
tcred            1593 kernel/sys.c   	tcred = __task_cred(task);
tcred            1594 kernel/sys.c   	id_match = (uid_eq(cred->uid, tcred->euid) &&
tcred            1595 kernel/sys.c   		    uid_eq(cred->uid, tcred->suid) &&
tcred            1596 kernel/sys.c   		    uid_eq(cred->uid, tcred->uid)  &&
tcred            1597 kernel/sys.c   		    gid_eq(cred->gid, tcred->egid) &&
tcred            1598 kernel/sys.c   		    gid_eq(cred->gid, tcred->sgid) &&
tcred            1599 kernel/sys.c   		    gid_eq(cred->gid, tcred->gid));
tcred            1600 kernel/sys.c   	if (!id_match && !ns_capable(tcred->user_ns, CAP_SYS_RESOURCE))
tcred            1603 kernel/sys.c   	return security_task_prlimit(cred, tcred, flags);
tcred              24 kernel/tsacct.c 	const struct cred *tcred;
tcred              53 kernel/tsacct.c 	tcred = __task_cred(tsk);
tcred              54 kernel/tsacct.c 	stats->ac_uid	 = from_kuid_munged(user_ns, tcred->uid);
tcred              55 kernel/tsacct.c 	stats->ac_gid	 = from_kgid_munged(user_ns, tcred->gid);
tcred            1674 security/security.c int security_task_prlimit(const struct cred *cred, const struct cred *tcred,
tcred            1677 security/security.c 	return call_int_hook(task_prlimit, 0, cred, tcred, flags);
tcred            4089 security/selinux/hooks.c static int selinux_task_prlimit(const struct cred *cred, const struct cred *tcred,
tcred            4101 security/selinux/hooks.c 			    cred_sid(cred), cred_sid(tcred),
tcred            1787 security/smack/smack_lsm.c 	const struct cred *tcred;
tcred            1804 security/smack/smack_lsm.c 	tcred = __task_cred(tsk);
tcred            1805 security/smack/smack_lsm.c 	if (rc != 0 && smack_privileged_cred(CAP_MAC_OVERRIDE, tcred))