Home
last modified time | relevance | path

Searched refs:__task_cred (Results 1 – 25 of 30) sorted by relevance

12

/Linux-v4.19/include/linux/
Dcred.h302 #define __task_cred(task) \ macro
349 ___val = __task_cred((task))->xxx; \
/Linux-v4.19/security/apparmor/include/
Dcred.h66 return aa_cred_raw_label(__task_cred(task)); in __aa_task_raw_label()
/Linux-v4.19/kernel/
Dcapability.c302 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability()
343 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
Dtsacct.c64 tcred = __task_cred(tsk); in bacct_add_tsk()
Dptrace.c81 __ptrace_link(child, new_parent, __task_cred(new_parent)); in ptrace_link()
311 tcred = __task_cred(task); in __ptrace_may_access()
Dcred.c195 cred = __task_cred((task)); in get_task_cred()
Dsignal.c407 user = get_uid(__task_cred(t)->user); in __sigqueue_alloc()
750 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred()
1387 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
Duser_namespace.c1247 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
Dsys.c155 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
1599 tcred = __task_cred(task); in check_prlimit_permission()
Dexit.c193 atomic_dec(&__task_cred(p)->user->processes); in release_task()
/Linux-v4.19/security/
Dcommoncap.c147 child_cred = __task_cred(child); in cap_ptrace_access_check()
182 cred = __task_cred(parent); in cap_ptrace_traceme()
212 cred = __task_cred(target); in cap_capget()
1096 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice()
1098 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
/Linux-v4.19/security/yama/
Dyama_lsm.c373 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
379 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
/Linux-v4.19/drivers/gpu/drm/
Ddrm_info.c98 uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID; in drm_clients_info()
/Linux-v4.19/arch/mips/kernel/
Dmips-mt-fpaff.c55 pcred = __task_cred(p); in check_same_owner()
/Linux-v4.19/security/apparmor/
Dresource.c116 peer = aa_get_newest_cred_label(__task_cred(task)); in aa_task_setrlimit()
Dlsm.c150 cred = __task_cred(target); in apparmor_capget()
/Linux-v4.19/block/
Dioprio.c42 tcred = __task_cred(task); in set_task_ioprio()
/Linux-v4.19/Documentation/security/
Dcredentials.rst367 const struct cred *__task_cred(struct task_struct *task);
376 tcred = __task_cred(t);
394 The result of ``__task_cred()`` should not be passed directly to
405 __task_cred(task)->uid
406 __task_cred(task)->euid
409 need to be accessed, RCU read lock should be used, ``__task_cred()`` called,
/Linux-v4.19/security/smack/
Dsmack.h390 skp = smk_of_task(__task_cred(t)->security); in smk_of_task_struct()
/Linux-v4.19/fs/proc/
Darray.c287 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig()
325 cred = __task_cred(p); in task_cap()
/Linux-v4.19/drivers/connector/
Dcn_proc.c147 cred = __task_cred(task); in proc_id_connector()
/Linux-v4.19/fs/
Dfcntl.c715 cred = __task_cred(p); in sigio_perm()
Dbinfmt_elf_fdpic.c1416 cred = __task_cred(p); in fill_psinfo()
/Linux-v4.19/security/keys/
Dkeyctl.c1540 pcred = __task_cred(parent); in keyctl_session_to_parent()
/Linux-v4.19/kernel/sched/
Dcore.c4108 pcred = __task_cred(p); in check_same_owner()
4767 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in sched_setaffinity()

12