Searched refs:__task_cred (Results 1 – 25 of 30) sorted by relevance
12
| /Linux-v5.4/include/linux/ |
| D | cred.h | 319 #define __task_cred(task) \ macro 366 ___val = __task_cred((task))->xxx; \
|
| /Linux-v5.4/kernel/ |
| D | capability.c | 300 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NONE); in has_ns_capability() 341 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NOAUDIT); in has_ns_capability_noaudit()
|
| D | tsacct.c | 53 tcred = __task_cred(tsk); in bacct_add_tsk()
|
| D | cred.c | 200 cred = __task_cred((task)); in get_task_cred()
|
| D | ptrace.c | 316 tcred = __task_cred(task); in __ptrace_may_access()
|
| D | user_namespace.c | 1245 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
|
| D | sys.c | 158 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm() 1593 tcred = __task_cred(task); in check_prlimit_permission()
|
| D | signal.c | 422 user = get_uid(__task_cred(t)->user); in __sigqueue_alloc() 809 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() 1467 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
|
| D | exit.c | 199 atomic_dec(&__task_cred(p)->user->processes); in release_task()
|
| /Linux-v5.4/security/apparmor/include/ |
| D | cred.h | 76 return aa_cred_raw_label(__task_cred(task)); in __aa_task_raw_label()
|
| /Linux-v5.4/security/ |
| D | commoncap.c | 141 child_cred = __task_cred(child); in cap_ptrace_access_check() 176 cred = __task_cred(parent); in cap_ptrace_traceme() 206 cred = __task_cred(target); in cap_capget() 1088 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice() 1090 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
|
| /Linux-v5.4/security/yama/ |
| D | yama_lsm.c | 371 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 377 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
|
| /Linux-v5.4/arch/mips/kernel/ |
| D | mips-mt-fpaff.c | 55 pcred = __task_cred(p); in check_same_owner()
|
| /Linux-v5.4/security/apparmor/ |
| D | resource.c | 112 peer = aa_get_newest_cred_label(__task_cred(task)); in aa_task_setrlimit()
|
| D | lsm.c | 144 cred = __task_cred(target); in apparmor_capget()
|
| /Linux-v5.4/block/ |
| D | ioprio.c | 43 tcred = __task_cred(task); in set_task_ioprio()
|
| /Linux-v5.4/Documentation/security/ |
| D | credentials.rst | 367 const struct cred *__task_cred(struct task_struct *task); 376 tcred = __task_cred(t); 394 The result of ``__task_cred()`` should not be passed directly to 405 __task_cred(task)->uid 406 __task_cred(task)->euid 409 need to be accessed, RCU read lock should be used, ``__task_cred()`` called,
|
| /Linux-v5.4/security/smack/ |
| D | smack.h | 409 cred = __task_cred(t); in smk_of_task_struct()
|
| D | smack_lsm.c | 436 tracercred = __task_cred(tracer); in smk_ptrace_rule_check() 1806 tcred = __task_cred(tsk); in smack_file_send_sigiotask()
|
| /Linux-v5.4/fs/proc/ |
| D | array.c | 287 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig() 325 cred = __task_cred(p); in task_cap()
|
| D | base.c | 1706 cred = __task_cred(task); in task_dump_owner() 2378 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_write() 2417 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_show()
|
| /Linux-v5.4/drivers/gpu/drm/ |
| D | drm_debugfs.c | 97 uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID; in drm_clients_info()
|
| /Linux-v5.4/drivers/connector/ |
| D | cn_proc.c | 133 cred = __task_cred(task); in proc_id_connector()
|
| /Linux-v5.4/fs/ |
| D | fcntl.c | 715 cred = __task_cred(p); in sigio_perm()
|
| /Linux-v5.4/security/keys/ |
| D | keyctl.c | 1597 pcred = __task_cred(parent); in keyctl_session_to_parent()
|
12