Home
last modified time | relevance | path

Searched refs:current_cred (Results 1 – 25 of 69) sorted by relevance

123

/Linux-v4.19/include/linux/
Dcred.h280 #define current_cred() \ macro
313 (get_cred(current_cred()))
325 __cred = current_cred(); \
340 __cred = current_cred(); \
359 current_cred()->xxx; \
388 __cred = current_cred(); \
396 __cred = current_cred(); \
404 __cred = current_cred(); \
/Linux-v4.19/security/
Dcommoncap.c146 cred = current_cred(); in cap_ptrace_access_check()
183 child_cred = current_cred(); in cap_ptrace_traceme()
230 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped()
724 const struct cred *old = current_cred(); in handle_privileged_root()
817 const struct cred *old = current_cred(); in cap_bprm_set_creds()
1097 current_cred()->cap_permitted); in cap_safe_nice()
1178 const struct cred *old = current_cred(); in cap_task_prctl()
1214 || (cap_capable(current_cred(), in cap_task_prctl()
1215 current_cred()->user_ns, CAP_SETPCAP, in cap_task_prctl()
1271 return !!cap_raised(current_cred()->cap_ambient, arg3); in cap_task_prctl()
[all …]
/Linux-v4.19/security/keys/
Dpersistent.c28 current_cred(), in key_create_persistent_register()
62 uid, INVALID_GID, current_cred(), in key_create_persistent()
113 ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK); in key_get_persistent()
Dprocess_keys.c55 cred = current_cred(); in install_user_keyrings()
468 ctx->cred == current_cred() && in search_process_keyrings()
780 old = current_cred(); in join_session_keyring()
846 const struct cred *old = current_cred(); in key_change_session_keyring()
Drequest_key.c99 const struct cred *cred = current_cred(); in call_sbin_request_key()
257 const struct cred *cred = current_cred(); in construct_get_dest_keyring()
548 .cred = current_cred(), in request_key_and_link()
Drequest_key_auth.c240 .cred = current_cred(), in key_get_instantiation_authkey()
/Linux-v4.19/kernel/
Dcapability.c271 ret = security_capset(new, current_cred(), in SYSCALL_DEFINE2()
276 audit_log_capset(new, current_cred()); in SYSCALL_DEFINE2()
375 capable = audit ? security_capable(current_cred(), ns, cap) : in ns_capable_common()
376 security_capable_noaudit(current_cred(), ns, cap); in ns_capable_common()
Dgroups.c155 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
221 const struct cred *cred = current_cred(); in in_group_p()
233 const struct cred *cred = current_cred(); in in_egroup_p()
Duid16.c66 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
89 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
156 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
Dsys.c155 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
197 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
267 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
366 old = current_cred(); in __sys_setregid()
424 old = current_cred(); in __sys_setgid()
509 old = current_cred(); in __sys_setreuid()
581 old = current_cred(); in __sys_setuid()
643 old = current_cred(); in __sys_setresuid()
690 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3()
732 old = current_cred(); in __sys_setresgid()
[all …]
/Linux-v4.19/security/integrity/ima/
Dima_main.c340 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap()
366 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check()
391 return process_measurement(file, current_cred(), secid, NULL, 0, in ima_file_check()
492 return process_measurement(file, current_cred(), secid, buf, size, in ima_post_read_file()
Dima_mok.c42 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in ima_mok_init()
/Linux-v4.19/certs/
Dsystem_keyring.c102 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
113 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
Dblacklist.c155 current_cred(), in blacklist_init()
/Linux-v4.19/security/integrity/
Dintegrity_audit.c44 from_kuid(&init_user_ns, current_cred()->uid), in integrity_audit_msg()
Ddigsig.c84 const struct cred *cred = current_cred(); in integrity_init_keyring()
/Linux-v4.19/security/apparmor/include/
Dcred.h79 return aa_cred_raw_label(current_cred()); in aa_current_raw_label()
/Linux-v4.19/include/rdma/
Dib.h103 return filp->f_cred == current_cred() && !uaccess_kernel(); in ib_safe_file_access()
/Linux-v4.19/security/apparmor/
Dtask.c56 if (current_cred() != current_real_cred()) in aa_replace_current_label()
/Linux-v4.19/arch/s390/kernel/
Dcompat_linux.c135 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE3()
159 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE3()
224 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE2()
/Linux-v4.19/security/selinux/
Dhooks.c723 const struct cred *cred = current_cred(); in selinux_set_mnt_opts()
2321 const struct cred *cred = current_cred(); in selinux_quotactl()
2349 const struct cred *cred = current_cred(); in selinux_quota_on()
2389 rc = cred_has_capability(current_cred(), CAP_SYS_ADMIN, in selinux_vm_enough_memory()
2923 const struct cred *cred = current_cred(); in selinux_sb_kern_mount()
2942 const struct cred *cred = current_cred(); in selinux_sb_statfs()
2956 const struct cred *cred = current_cred(); in selinux_mount()
2967 const struct cred *cred = current_cred(); in selinux_umount()
3115 const struct cred *cred = current_cred(); in selinux_inode_readlink()
3123 const struct cred *cred = current_cred(); in selinux_inode_follow_link()
[all …]
/Linux-v4.19/fs/ecryptfs/
Dkthread.c77 (O_RDWR | O_LARGEFILE), current_cred()); in ecryptfs_threadfn()
/Linux-v4.19/arch/mips/kernel/
Dmips-mt-fpaff.c51 const struct cred *cred = current_cred(), *pcred; in check_same_owner()
/Linux-v4.19/security/tomoyo/
Dsecurityfs_if.c240 if (current_cred()->security != &tomoyo_kernel_domain) in tomoyo_initerface_init()
/Linux-v4.19/block/
Dioprio.c39 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio()

123