/linux-4.1.27/include/linux/ |
D | cred.h | 274 #define current_cred() \ macro 307 (get_cred(current_cred())) 319 __cred = current_cred(); \ 334 __cred = current_cred(); \ 353 current_cred()->xxx; \ 379 __cred = current_cred(); \ 387 __cred = current_cred(); \ 395 __cred = current_cred(); \
|
/linux-4.1.27/security/ |
D | commoncap.c | 148 cred = current_cred(); in cap_ptrace_access_check() 185 child_cred = current_cred(); in cap_ptrace_traceme() 232 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 485 const struct cred *old = current_cred(); in cap_bprm_set_creds() 596 const struct cred *cred = current_cred(); in cap_bprm_secureexec() 779 current_cred()->cap_permitted); in cap_safe_nice() 860 const struct cred *old = current_cred(); in cap_task_prctl() 896 || (cap_capable(current_cred(), in cap_task_prctl() 897 current_cred()->user_ns, CAP_SETPCAP, in cap_task_prctl() 955 if (cap_capable(current_cred(), &init_user_ns, CAP_SYS_ADMIN, in cap_vm_enough_memory() [all …]
|
/linux-4.1.27/security/keys/ |
D | persistent.c | 26 current_cred(), in key_create_persistent_register() 60 uid, INVALID_GID, current_cred(), in key_create_persistent() 111 ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK); in key_get_persistent()
|
D | process_keys.c | 54 cred = current_cred(); in install_user_keyrings() 451 ctx->cred == current_cred() && in search_process_keyrings() 763 old = current_cred(); in join_session_keyring() 828 const struct cred *old = current_cred(); in key_change_session_keyring()
|
D | request_key.c | 98 const struct cred *cred = current_cred(); in call_sbin_request_key() 256 const struct cred *cred = current_cred(); in construct_get_dest_keyring() 516 .cred = current_cred(), in request_key_and_link()
|
D | big_key.c | 182 file = dentry_open(path, O_RDONLY, current_cred()); in big_key_read()
|
D | request_key_auth.c | 248 .cred = current_cred(), in key_get_instantiation_authkey()
|
D | internal.h | 181 return key_task_permission(key_ref, current_cred(), perm); in key_permission()
|
D | keyctl.c | 1013 const struct cred *cred = current_cred(); in keyctl_instantiate_key_common() 1180 const struct cred *cred = current_cred(); in keyctl_reject_key() 1510 mycred = current_cred(); in keyctl_session_to_parent()
|
D | proc.c | 190 .cred = current_cred(), in proc_keys_show()
|
D | key.c | 786 const struct cred *cred = current_cred(); in key_create_or_update()
|
D | keyring.c | 896 .cred = current_cred(), in keyring_search()
|
/linux-4.1.27/security/apparmor/include/ |
D | context.h | 25 #define current_cxt() cred_cxt(current_cred()) 138 return aa_cred_profile(current_cred()); in __aa_current_profile()
|
/linux-4.1.27/kernel/ |
D | groups.c | 192 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 257 const struct cred *cred = current_cred(); in in_group_p() 269 const struct cred *cred = current_cred(); in in_egroup_p()
|
D | uid16.c | 62 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 86 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 153 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
|
D | capability.c | 270 ret = security_capset(new, current_cred(), in SYSCALL_DEFINE2() 275 audit_log_capset(new, current_cred()); in SYSCALL_DEFINE2() 382 if (security_capable(current_cred(), ns, cap) == 0) { in ns_capable()
|
D | sys.c | 137 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm() 179 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 249 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 348 old = current_cred(); in SYSCALL_DEFINE2() 401 old = current_cred(); in SYSCALL_DEFINE1() 481 old = current_cred(); in SYSCALL_DEFINE2() 548 old = current_cred(); in SYSCALL_DEFINE1() 605 old = current_cred(); in SYSCALL_DEFINE3() 647 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 689 old = current_cred(); in SYSCALL_DEFINE3() [all …]
|
D | system_keyring.c | 36 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in system_trusted_keyring_init()
|
D | seccomp.c | 367 security_capable_noaudit(current_cred(), current_user_ns(), in seccomp_prepare_filter()
|
D | ptrace.c | 221 const struct cred *cred = current_cred(), *tcred; in __ptrace_may_access()
|
D | audit.c | 1871 cred = current_cred(); in audit_log_task_info()
|
D | signal.c | 745 const struct cred *cred = current_cred(); in kill_ok_by_cred()
|
D | cgroup.c | 2387 const struct cred *cred = current_cred(), *tcred; in __cgroup_procs_write()
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/linux/ |
D | lustre_compat25.h | 51 #define current_ngroups current_cred()->group_info->ngroups 52 #define current_groups current_cred()->group_info->small_block
|
/linux-4.1.27/security/integrity/ |
D | integrity_audit.c | 44 from_kuid(&init_user_ns, current_cred()->uid), in integrity_audit_msg()
|
D | digsig.c | 68 const struct cred *cred = current_cred(); in integrity_init_keyring()
|
/linux-4.1.27/include/rdma/ |
D | ib.h | 102 return filp->f_cred == current_cred() && segment_eq(get_fs(), USER_DS); in ib_safe_file_access()
|
/linux-4.1.27/security/selinux/ |
D | hooks.c | 608 const struct cred *cred = current_cred(); in selinux_set_mnt_opts() 2071 const struct cred *cred = current_cred(); in selinux_quotactl() 2099 const struct cred *cred = current_cred(); in selinux_quota_on() 2143 rc = selinux_capable(current_cred(), &init_user_ns, CAP_SYS_ADMIN, in selinux_vm_enough_memory() 2661 const struct cred *cred = current_cred(); in selinux_sb_kern_mount() 2680 const struct cred *cred = current_cred(); in selinux_sb_statfs() 2694 const struct cred *cred = current_cred(); in selinux_mount() 2705 const struct cred *cred = current_cred(); in selinux_umount() 2727 const struct cred *cred = current_cred(); in selinux_dentry_init_security() 2860 const struct cred *cred = current_cred(); in selinux_inode_readlink() [all …]
|
/linux-4.1.27/arch/s390/kernel/ |
D | compat_linux.c | 135 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE3() 159 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE3() 224 const struct cred *cred = current_cred(); in COMPAT_SYSCALL_DEFINE2()
|
/linux-4.1.27/fs/ecryptfs/ |
D | kthread.c | 78 (O_RDWR | O_LARGEFILE), current_cred()); in ecryptfs_threadfn()
|
D | main.c | 122 const struct cred *cred = current_cred(); in ecryptfs_init_lower_file()
|
/linux-4.1.27/arch/mips/kernel/ |
D | mips-mt-fpaff.c | 48 const struct cred *cred = current_cred(), *pcred; in check_same_owner()
|
/linux-4.1.27/security/tomoyo/ |
D | securityfs_if.c | 244 if (current_cred()->security != &tomoyo_kernel_domain) in tomoyo_initerface_init()
|
D | tomoyo.c | 547 struct cred *cred = (struct cred *) current_cred(); in tomoyo_init()
|
D | common.h | 1205 return current_cred()->security; in tomoyo_domain()
|
/linux-4.1.27/block/ |
D | ioprio.c | 36 const struct cred *cred = current_cred(), *tcred; in set_task_ioprio()
|
/linux-4.1.27/fs/ |
D | file_table.c | 105 const struct cred *cred = current_cred(); in get_empty_filp()
|
D | coredump.c | 166 const struct cred *cred = current_cred(); in format_corename()
|
D | fcntl.c | 93 const struct cred *cred = current_cred(); in f_modown()
|
D | open.c | 797 current_cred()); in finish_open()
|
D | namei.c | 783 if (uid_eq(current_cred()->fsuid, inode->i_uid)) in may_follow_link() 856 cred = current_cred(); in may_linkat() 3122 error = vfs_open(&nd->path, file, current_cred()); in do_last()
|
D | binfmt_elf_fdpic.c | 472 const struct cred *cred = current_cred(); in create_elf_fdpic_tables()
|
D | binfmt_elf.c | 168 const struct cred *cred = current_cred(); in create_elf_tables()
|
/linux-4.1.27/arch/powerpc/platforms/cell/spufs/ |
D | inode.c | 308 filp = dentry_open(path, O_RDONLY, current_cred()); in spufs_context_open() 529 filp = dentry_open(path, O_RDONLY, current_cred()); in spufs_gang_open()
|
/linux-4.1.27/net/core/ |
D | scm.c | 49 const struct cred *cred = current_cred(); in scm_check_creds()
|
/linux-4.1.27/fs/exportfs/ |
D | expfs.c | 272 const struct cred *cred = current_cred(); in get_name()
|
/linux-4.1.27/fs/autofs4/ |
D | dev-ioctl.c | 253 filp = dentry_open(&path, O_RDONLY, current_cred()); in autofs_dev_ioctl_open_mountpoint()
|
/linux-4.1.27/net/rxrpc/ |
D | ar-key.c | 967 const struct cred *cred = current_cred(); in rxrpc_get_server_data_key() 1021 const struct cred *cred = current_cred(); in rxrpc_get_null_key()
|
/linux-4.1.27/ipc/ |
D | mqueue.c | 732 const struct cred *cred = current_cred(); in do_create() 772 return dentry_open(path, oflag, current_cred()); in do_open()
|
/linux-4.1.27/net/sunrpc/ |
D | auth.c | 625 const struct cred *cred = current_cred(); in rpcauth_lookupcred()
|
/linux-4.1.27/security/integrity/ima/ |
D | ima_policy.c | 215 const struct cred *cred = current_cred(); in ima_match_rules()
|
/linux-4.1.27/fs/notify/fanotify/ |
D | fanotify_user.c | 94 current_cred()); in create_fd()
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 338 const struct cred *current_cred() 476 are available for this purpose as current_cred() will return the current set
|
/linux-4.1.27/fs/overlayfs/ |
D | super.c | 468 return dentry_open(path, flags, current_cred()); in ovl_path_open()
|
/linux-4.1.27/mm/ |
D | migrate.c | 1463 const struct cred *cred = current_cred(), *tcred; in SYSCALL_DEFINE6()
|
D | mempolicy.c | 1346 const struct cred *cred = current_cred(), *tcred; in SYSCALL_DEFINE4()
|
/linux-4.1.27/fs/xfs/ |
D | xfs_ioctl.c | 197 const struct cred *cred = current_cred(); in xfs_open_by_handle()
|
/linux-4.1.27/fs/nfsd/ |
D | vfs.c | 739 file = dentry_open(&path, flags, current_cred()); in nfsd_open()
|
/linux-4.1.27/lib/ |
D | vsprintf.c | 1568 const struct cred *cred = current_cred(); in pointer()
|
/linux-4.1.27/drivers/staging/lustre/lustre/ptlrpc/ |
D | sec.c | 2321 memcpy(pud->pud_groups, current_cred()->group_info->blocks[0], in sptlrpc_pack_user_desc()
|
/linux-4.1.27/drivers/net/ |
D | tun.c | 418 const struct cred *cred = current_cred(); in tun_not_capable()
|
/linux-4.1.27/fs/fuse/ |
D | dir.c | 1020 cred = current_cred(); in fuse_allow_current_process()
|
/linux-4.1.27/kernel/sched/ |
D | core.c | 3389 const struct cred *cred = current_cred(), *pcred; in check_same_owner()
|