/linux-4.4.14/security/ |
D | commoncap.c | 144 child_cred = __task_cred(child); in cap_ptrace_access_check() 179 cred = __task_cred(parent); in cap_ptrace_traceme() 209 cred = __task_cred(target); in cap_capget() 818 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice() 820 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
|
/linux-4.4.14/include/linux/ |
D | cred.h | 304 #define __task_cred(task) \ macro 351 ___val = __task_cred((task))->xxx; \
|
/linux-4.4.14/kernel/ |
D | capability.c | 301 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability() 341 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
|
D | tsacct.c | 62 tcred = __task_cred(tsk); in bacct_add_tsk()
|
D | ptrace.c | 259 tcred = __task_cred(task); in __ptrace_may_access() 278 !ptrace_has_cap(__task_cred(task)->user_ns, mode)) { in __ptrace_may_access() 347 if (ns_capable(__task_cred(task)->user_ns, CAP_SYS_PTRACE)) in ptrace_attach()
|
D | cred.c | 194 cred = __task_cred((task)); in get_task_cred()
|
D | user_namespace.c | 958 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
|
D | signal.c | 371 user = get_uid(__task_cred(t)->user); in __sigqueue_alloc() 695 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred() 1322 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
|
D | sys.c | 137 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm() 1434 tcred = __task_cred(task); in check_prlimit_permission()
|
D | exit.c | 177 atomic_dec(&__task_cred(p)->user->processes); in release_task()
|
/linux-4.4.14/security/yama/ |
D | yama_lsm.c | 293 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 299 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
|
/linux-4.4.14/security/apparmor/include/ |
D | context.h | 114 return aa_cred_profile(__task_cred(task)); in __aa_task_profile()
|
/linux-4.4.14/security/apparmor/ |
D | resource.c | 98 task_profile = aa_get_profile(aa_cred_profile(__task_cred(task))); in aa_task_setrlimit()
|
D | lsm.c | 115 cred = __task_cred(target); in apparmor_capget()
|
/linux-4.4.14/arch/mips/kernel/ |
D | mips-mt-fpaff.c | 52 pcred = __task_cred(p); in check_same_owner()
|
/linux-4.4.14/block/ |
D | ioprio.c | 39 tcred = __task_cred(task); in set_task_ioprio()
|
/linux-4.4.14/Documentation/security/ |
D | credentials.txt | 394 const struct cred *__task_cred(struct task_struct *task); 403 tcred = __task_cred(t); 420 [*] Note: The result of __task_cred() should not be passed directly to 431 __task_cred(task)->uid 432 __task_cred(task)->euid 435 need to be accessed, RCU read lock should be used, __task_cred() called, the
|
/linux-4.4.14/security/smack/ |
D | smack.h | 371 skp = smk_of_task(__task_cred(t)->security); in smk_of_task_struct()
|
D | smack_lsm.c | 434 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
|
/linux-4.4.14/fs/proc/ |
D | array.c | 278 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig() 315 cred = __task_cred(p); in task_cap()
|
D | fd.c | 113 cred = __task_cred(task); in tid_fd_revalidate()
|
D | base.c | 1669 cred = __task_cred(task); in proc_pid_make_inode() 1708 cred = __task_cred(task); in pid_getattr() 1750 cred = __task_cred(task); in pid_revalidate() 1876 cred = __task_cred(task); in map_files_d_revalidate()
|
/linux-4.4.14/drivers/connector/ |
D | cn_proc.c | 141 cred = __task_cred(task); in proc_id_connector()
|
/linux-4.4.14/fs/ |
D | fcntl.c | 439 cred = __task_cred(p); in sigio_perm()
|
D | binfmt_elf_fdpic.c | 1436 cred = __task_cred(p); in fill_psinfo()
|
D | binfmt_elf.c | 1470 cred = __task_cred(p); in fill_psinfo()
|
/linux-4.4.14/security/selinux/ |
D | hooks.c | 208 sid = cred_sid(__task_cred(task)); in task_sid() 1536 __tsec1 = __task_cred(tsk1)->security; sid1 = __tsec1->sid; in task_has_perm() 1537 __tsec2 = __task_cred(tsk2)->security; sid2 = __tsec2->sid; in task_has_perm() 2297 sec = __task_cred(tracer)->security; in selinux_bprm_set_creds() 5575 __tsec = __task_cred(p)->security; in selinux_getprocattr()
|
D | selinuxfs.c | 88 tsec = __task_cred(tsk)->security; in task_has_security()
|
/linux-4.4.14/security/keys/ |
D | keyctl.c | 1505 pcred = __task_cred(parent); in keyctl_session_to_parent()
|
/linux-4.4.14/mm/ |
D | migrate.c | 1512 tcred = __task_cred(task); in SYSCALL_DEFINE6()
|
D | mempolicy.c | 1384 tcred = __task_cred(task); in SYSCALL_DEFINE4()
|
/linux-4.4.14/Documentation/ |
D | kmemcheck.txt | 435 199 user = get_uid(__task_cred(t)->user);
|
/linux-4.4.14/kernel/sched/ |
D | core.c | 3764 pcred = __task_cred(p); in check_same_owner() 4433 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in sched_setaffinity()
|
/linux-4.4.14/arch/ia64/kernel/ |
D | perfmon.c | 2367 tcred = __task_cred(task); in pfm_bad_permissions()
|