| /Linux-v5.4/include/linux/ |
| D | cred.h | 297 #define current_cred() \ macro 330 (get_cred(current_cred())) 342 __cred = current_cred(); \ 357 __cred = current_cred(); \ 376 current_cred()->xxx; \ 404 __cred = current_cred(); \ 412 __cred = current_cred(); \ 420 __cred = current_cred(); \
|
| /Linux-v5.4/security/ |
| D | commoncap.c | 140 cred = current_cred(); in cap_ptrace_access_check() 177 child_cred = current_cred(); in cap_ptrace_traceme() 223 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 716 const struct cred *old = current_cred(); in handle_privileged_root() 809 const struct cred *old = current_cred(); in cap_bprm_set_creds() 1089 current_cred()->cap_permitted); in cap_safe_nice() 1170 const struct cred *old = current_cred(); in cap_task_prctl() 1206 || (cap_capable(current_cred(), in cap_task_prctl() 1207 current_cred()->user_ns, in cap_task_prctl() 1264 return !!cap_raised(current_cred()->cap_ambient, arg3); in cap_task_prctl() [all …]
|
| /Linux-v5.4/security/keys/ |
| D | persistent.c | 24 current_cred(), in key_create_persistent_register() 58 uid, INVALID_GID, current_cred(), in key_create_persistent() 111 ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK); in key_get_persistent()
|
| D | request_key.c | 119 const struct cred *cred = current_cred(); in call_sbin_request_key() 265 const struct cred *cred = current_cred(); in construct_get_dest_keyring() 572 .cred = current_cred(), in request_key_and_link() 607 ret = key_task_permission(key_ref, current_cred(), in request_key_and_link() 775 .cred = current_cred(), in request_key_rcu()
|
| D | request_key_auth.c | 167 const struct cred *cred = current_cred(); in request_key_auth_new() 253 .cred = current_cred(), in key_get_instantiation_authkey()
|
| D | process_keys.c | 77 const struct cred *cred = current_cred(); in look_up_user_keyrings() 554 ctx->cred == current_cred() && in search_process_keyrings_rcu() 848 old = current_cred(); in join_session_keyring() 914 const struct cred *old = current_cred(); in key_change_session_keyring()
|
| /Linux-v5.4/kernel/ |
| D | groups.c | 155 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 221 const struct cred *cred = current_cred(); in in_group_p() 233 const struct cred *cred = current_cred(); in in_egroup_p()
|
| D | uid16.c | 66 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 89 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 156 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
|
| D | capability.c | 269 ret = security_capset(new, current_cred(), in SYSCALL_DEFINE2() 274 audit_log_capset(new, current_cred()); in SYSCALL_DEFINE2() 375 capable = security_capable(current_cred(), ns, cap, opts); in ns_capable_common()
|
| D | sys.c | 158 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm() 200 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 270 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 369 old = current_cred(); in __sys_setregid() 427 old = current_cred(); in __sys_setgid() 512 old = current_cred(); in __sys_setreuid() 584 old = current_cred(); in __sys_setuid() 646 old = current_cred(); in __sys_setresuid() 693 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 735 old = current_cred(); in __sys_setresgid() [all …]
|
| /Linux-v5.4/security/integrity/ima/ |
| D | ima_main.c | 387 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap() 413 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check() 438 return process_measurement(file, current_cred(), secid, NULL, 0, in ima_file_check() 570 return process_measurement(file, current_cred(), secid, buf, size, in ima_post_read_file() 694 current_cred(), secid); in ima_kexec_cmdline()
|
| D | ima_mok.c | 37 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in ima_mok_init()
|
| /Linux-v5.4/certs/ |
| D | system_keyring.c | 101 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init() 112 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
|
| D | blacklist.c | 151 current_cred(), in blacklist_init()
|
| /Linux-v5.4/security/selinux/ |
| D | hooks.c | 651 const struct cred *cred = current_cred(); in selinux_set_mnt_opts() 1814 const struct task_security_struct *tsec = selinux_cred(current_cred()); in may_create() 1836 rc = selinux_determine_inode_label(selinux_cred(current_cred()), dir, in may_create() 2183 const struct cred *cred = current_cred(); in selinux_quotactl() 2211 const struct cred *cred = current_cred(); in selinux_quota_on() 2251 rc = cred_has_capability(current_cred(), CAP_SYS_ADMIN, in selinux_vm_enough_memory() 2343 old_tsec = selinux_cred(current_cred()); in selinux_bprm_set_creds() 2551 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_bprm_committed_creds() 2736 const struct cred *cred = current_cred(); in selinux_sb_kern_mount() 2746 const struct cred *cred = current_cred(); in selinux_sb_statfs() [all …]
|
| D | xfrm.c | 79 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_xfrm_alloc_user() 138 const struct task_security_struct *tsec = selinux_cred(current_cred()); in selinux_xfrm_delete()
|
| /Linux-v5.4/security/integrity/ |
| D | integrity_audit.c | 41 from_kuid(&init_user_ns, current_cred()->uid), in integrity_audit_msg()
|
| /Linux-v5.4/include/rdma/ |
| D | ib.h | 105 return filp->f_cred == current_cred() && !uaccess_kernel(); in ib_safe_file_access()
|
| /Linux-v5.4/security/apparmor/include/ |
| D | cred.h | 89 return aa_cred_raw_label(current_cred()); in aa_current_raw_label()
|
| /Linux-v5.4/fs/crypto/ |
| D | keyring.c | 206 current_cred(), KEY_POS_SEARCH | in allocate_filesystem_keyring() 250 current_cred(), KEY_POS_SEARCH | in allocate_master_key_users_keyring() 287 current_fsuid(), current_gid(), current_cred(), in add_master_key_user() 359 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(), in add_new_master_key()
|
| /Linux-v5.4/security/apparmor/ |
| D | task.c | 52 if (current_cred() != current_real_cred()) in aa_replace_current_label()
|
| /Linux-v5.4/security/selinux/include/ |
| D | objsec.h | 183 const struct task_security_struct *tsec = selinux_cred(current_cred()); in current_sid()
|
| /Linux-v5.4/fs/verity/ |
| D | signature.c | 140 current_cred(), KEY_POS_SEARCH | in fsverity_init_signature()
|
| /Linux-v5.4/security/smack/ |
| D | smackfs.c | 2183 struct task_smack *tsp = smack_cred(current_cred()); in load_self_seq_start() 2190 struct task_smack *tsp = smack_cred(current_cred()); in load_self_seq_next() 2237 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_load_self() 2391 struct task_smack *tsp = smack_cred(current_cred()); in load_self2_seq_start() 2398 struct task_smack *tsp = smack_cred(current_cred()); in load_self2_seq_next() 2444 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_load_self2() 2658 struct task_smack *tsp = smack_cred(current_cred()); in relabel_self_seq_start() 2665 struct task_smack *tsp = smack_cred(current_cred()); in relabel_self_seq_next() 2713 struct task_smack *tsp = smack_cred(current_cred()); in smk_write_relabel_self()
|
| /Linux-v5.4/fs/ecryptfs/ |
| D | kthread.c | 63 (O_RDWR | O_LARGEFILE), current_cred()); in ecryptfs_threadfn()
|