Home
last modified time | relevance | path

Searched refs:__task_cred (Results 1 – 35 of 35) sorted by relevance

/linux-4.1.27/security/
Dcommoncap.c149 child_cred = __task_cred(child); in cap_ptrace_access_check()
184 cred = __task_cred(parent); in cap_ptrace_traceme()
214 cred = __task_cred(target); in cap_capget()
778 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice()
780 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
/linux-4.1.27/kernel/
Dcapability.c301 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability()
341 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
Dtsacct.c62 tcred = __task_cred(tsk); in bacct_add_tsk()
Dptrace.c259 tcred = __task_cred(task); in __ptrace_may_access()
278 !ptrace_has_cap(__task_cred(task)->user_ns, mode)) { in __ptrace_may_access()
347 if (ns_capable(__task_cred(task)->user_ns, CAP_SYS_PTRACE)) in ptrace_attach()
Dcred.c189 cred = __task_cred((task)); in get_task_cred()
Duser_namespace.c957 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
Dsignal.c371 user = get_uid(__task_cred(t)->user); in __sigqueue_alloc()
746 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred()
1373 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
Dsys.c137 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
1434 tcred = __task_cred(task); in check_prlimit_permission()
Dexit.c177 atomic_dec(&__task_cred(p)->user->processes); in release_task()
Dcgroup.c2412 tcred = __task_cred(tsk); in __cgroup_procs_write()
/linux-4.1.27/include/linux/
Dcred.h296 #define __task_cred(task) \ macro
343 ___val = __task_cred((task))->xxx; \
/linux-4.1.27/security/yama/
Dyama_lsm.c304 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
310 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
/linux-4.1.27/security/apparmor/include/
Dcontext.h114 return aa_cred_profile(__task_cred(task)); in __aa_task_profile()
/linux-4.1.27/security/apparmor/
Dresource.c98 task_profile = aa_get_profile(aa_cred_profile(__task_cred(task))); in aa_task_setrlimit()
Dlsm.c123 cred = __task_cred(target); in apparmor_capget()
/linux-4.1.27/arch/mips/kernel/
Dmips-mt-fpaff.c52 pcred = __task_cred(p); in check_same_owner()
/linux-4.1.27/block/
Dioprio.c39 tcred = __task_cred(task); in set_task_ioprio()
/linux-4.1.27/Documentation/security/
Dcredentials.txt394 const struct cred *__task_cred(struct task_struct *task);
403 tcred = __task_cred(t);
420 [*] Note: The result of __task_cred() should not be passed directly to
431 __task_cred(task)->uid
432 __task_cred(task)->euid
435 need to be accessed, RCU read lock should be used, __task_cred() called, the
/linux-4.1.27/security/smack/
Dsmack.h315 skp = smk_of_task(__task_cred(t)->security); in smk_of_task_struct()
Dsmack_lsm.c390 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
/linux-4.1.27/fs/proc/
Darray.c270 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig()
306 cred = __task_cred(p); in task_cap()
Dfd.c113 cred = __task_cred(task); in tid_fd_revalidate()
Dbase.c1481 cred = __task_cred(task); in proc_pid_make_inode()
1520 cred = __task_cred(task); in pid_getattr()
1562 cred = __task_cred(task); in pid_revalidate()
1695 cred = __task_cred(task); in map_files_d_revalidate()
/linux-4.1.27/drivers/connector/
Dcn_proc.c141 cred = __task_cred(task); in proc_id_connector()
/linux-4.1.27/fs/
Dfcntl.c439 cred = __task_cred(p); in sigio_perm()
Dbinfmt_elf_fdpic.c1396 cred = __task_cred(p); in fill_psinfo()
Dbinfmt_elf.c1460 cred = __task_cred(p); in fill_psinfo()
/linux-4.1.27/security/selinux/
Dhooks.c207 sid = cred_sid(__task_cred(task)); in task_sid()
1512 __tsec1 = __task_cred(tsk1)->security; sid1 = __tsec1->sid; in task_has_perm()
1513 __tsec2 = __task_cred(tsk2)->security; sid2 = __tsec2->sid; in task_has_perm()
2285 sec = __task_cred(tracer)->security; in selinux_bprm_set_creds()
5561 __tsec = __task_cred(p)->security; in selinux_getprocattr()
Dselinuxfs.c88 tsec = __task_cred(tsk)->security; in task_has_security()
/linux-4.1.27/security/keys/
Dkeyctl.c1511 pcred = __task_cred(parent); in keyctl_session_to_parent()
/linux-4.1.27/mm/
Dmigrate.c1491 tcred = __task_cred(task); in SYSCALL_DEFINE6()
Dmempolicy.c1387 tcred = __task_cred(task); in SYSCALL_DEFINE4()
/linux-4.1.27/Documentation/
Dkmemcheck.txt435 199 user = get_uid(__task_cred(t)->user);
/linux-4.1.27/kernel/sched/
Dcore.c3393 pcred = __task_cred(p); in check_same_owner()
4050 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in sched_setaffinity()
/linux-4.1.27/arch/ia64/kernel/
Dperfmon.c2367 tcred = __task_cred(task); in pfm_bad_permissions()