Home
last modified time | relevance | path

Searched refs:current_cred (Results 1 – 25 of 84) sorted by relevance

1234

/Linux-v5.4/include/linux/
Dcred.h297 #define current_cred() \ macro
330 (get_cred(current_cred()))
342 __cred = current_cred(); \
357 __cred = current_cred(); \
376 current_cred()->xxx; \
404 __cred = current_cred(); \
412 __cred = current_cred(); \
420 __cred = current_cred(); \
/Linux-v5.4/security/
Dcommoncap.c140 cred = current_cred(); in cap_ptrace_access_check()
177 child_cred = current_cred(); in cap_ptrace_traceme()
223 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped()
716 const struct cred *old = current_cred(); in handle_privileged_root()
809 const struct cred *old = current_cred(); in cap_bprm_set_creds()
1089 current_cred()->cap_permitted); in cap_safe_nice()
1170 const struct cred *old = current_cred(); in cap_task_prctl()
1206 || (cap_capable(current_cred(), in cap_task_prctl()
1207 current_cred()->user_ns, in cap_task_prctl()
1264 return !!cap_raised(current_cred()->cap_ambient, arg3); in cap_task_prctl()
[all …]
/Linux-v5.4/security/keys/
Dpersistent.c24 current_cred(), in key_create_persistent_register()
58 uid, INVALID_GID, current_cred(), in key_create_persistent()
111 ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK); in key_get_persistent()
Drequest_key.c119 const struct cred *cred = current_cred(); in call_sbin_request_key()
265 const struct cred *cred = current_cred(); in construct_get_dest_keyring()
572 .cred = current_cred(), in request_key_and_link()
607 ret = key_task_permission(key_ref, current_cred(), in request_key_and_link()
775 .cred = current_cred(), in request_key_rcu()
Drequest_key_auth.c167 const struct cred *cred = current_cred(); in request_key_auth_new()
253 .cred = current_cred(), in key_get_instantiation_authkey()
Dprocess_keys.c77 const struct cred *cred = current_cred(); in look_up_user_keyrings()
554 ctx->cred == current_cred() && in search_process_keyrings_rcu()
848 old = current_cred(); in join_session_keyring()
914 const struct cred *old = current_cred(); in key_change_session_keyring()
/Linux-v5.4/kernel/
Dgroups.c155 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
221 const struct cred *cred = current_cred(); in in_group_p()
233 const struct cred *cred = current_cred(); in in_egroup_p()
Duid16.c66 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
89 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
156 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
Dcapability.c269 ret = security_capset(new, current_cred(), in SYSCALL_DEFINE2()
274 audit_log_capset(new, current_cred()); in SYSCALL_DEFINE2()
375 capable = security_capable(current_cred(), ns, cap, opts); in ns_capable_common()
Dsys.c158 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
200 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
270 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
369 old = current_cred(); in __sys_setregid()
427 old = current_cred(); in __sys_setgid()
512 old = current_cred(); in __sys_setreuid()
584 old = current_cred(); in __sys_setuid()
646 old = current_cred(); in __sys_setresuid()
693 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
735 old = current_cred(); in __sys_setresgid()
[all …]
/Linux-v5.4/security/integrity/ima/
Dima_main.c387 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap()
413 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check()
438 return process_measurement(file, current_cred(), secid, NULL, 0, in ima_file_check()
570 return process_measurement(file, current_cred(), secid, buf, size, in ima_post_read_file()
694 current_cred(), secid); in ima_kexec_cmdline()
Dima_mok.c37 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in ima_mok_init()
/Linux-v5.4/certs/
Dsystem_keyring.c101 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
112 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
Dblacklist.c151 current_cred(), in blacklist_init()
/Linux-v5.4/security/selinux/
Dhooks.c651 const struct cred *cred = current_cred(); in selinux_set_mnt_opts()
1814 const struct task_security_struct *tsec = selinux_cred(current_cred()); in may_create()
1836 rc = selinux_determine_inode_label(selinux_cred(current_cred()), dir, in may_create()
2183 const struct cred *cred = current_cred(); in selinux_quotactl()
2211 const struct cred *cred = current_cred(); in selinux_quota_on()
2251 rc = cred_has_capability(current_cred(), CAP_SYS_ADMIN, in selinux_vm_enough_memory()
2343 old_tsec = selinux_cred(current_cred()); in selinux_bprm_set_creds()
2551 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_bprm_committed_creds()
2736 const struct cred *cred = current_cred(); in selinux_sb_kern_mount()
2746 const struct cred *cred = current_cred(); in selinux_sb_statfs()
[all …]
Dxfrm.c79 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_xfrm_alloc_user()
138 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_xfrm_delete()
/Linux-v5.4/security/integrity/
Dintegrity_audit.c41 from_kuid(&init_user_ns, current_cred()->uid), in integrity_audit_msg()
/Linux-v5.4/include/rdma/
Dib.h105 return filp->f_cred == current_cred() && !uaccess_kernel(); in ib_safe_file_access()
/Linux-v5.4/security/apparmor/include/
Dcred.h89 return aa_cred_raw_label(current_cred()); in aa_current_raw_label()
/Linux-v5.4/fs/crypto/
Dkeyring.c206 current_cred(), KEY_POS_SEARCH | in allocate_filesystem_keyring()
250 current_cred(), KEY_POS_SEARCH | in allocate_master_key_users_keyring()
287 current_fsuid(), current_gid(), current_cred(), in add_master_key_user()
359 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(), in add_new_master_key()
/Linux-v5.4/security/apparmor/
Dtask.c52 if (current_cred() != current_real_cred()) in aa_replace_current_label()
/Linux-v5.4/security/selinux/include/
Dobjsec.h183 const struct task_security_struct *tsec = selinux_cred(current_cred()); in current_sid()
/Linux-v5.4/fs/verity/
Dsignature.c140 current_cred(), KEY_POS_SEARCH | in fsverity_init_signature()
/Linux-v5.4/security/smack/
Dsmackfs.c2183 struct task_smack *tsp = smack_cred(current_cred()); in load_self_seq_start()
2190 struct task_smack *tsp = smack_cred(current_cred()); in load_self_seq_next()
2237 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_load_self()
2391 struct task_smack *tsp = smack_cred(current_cred()); in load_self2_seq_start()
2398 struct task_smack *tsp = smack_cred(current_cred()); in load_self2_seq_next()
2444 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_load_self2()
2658 struct task_smack *tsp = smack_cred(current_cred()); in relabel_self_seq_start()
2665 struct task_smack *tsp = smack_cred(current_cred()); in relabel_self_seq_next()
2713 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_relabel_self()
/Linux-v5.4/fs/ecryptfs/
Dkthread.c63 (O_RDWR | O_LARGEFILE), current_cred()); in ecryptfs_threadfn()

1234