Home
last modified time | relevance | path

Searched refs:__task_cred (Results 1 – 34 of 34) sorted by relevance

/linux-4.4.14/security/
Dcommoncap.c144 child_cred = __task_cred(child); in cap_ptrace_access_check()
179 cred = __task_cred(parent); in cap_ptrace_traceme()
209 cred = __task_cred(target); in cap_capget()
818 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice()
820 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
/linux-4.4.14/include/linux/
Dcred.h304 #define __task_cred(task) \ macro
351 ___val = __task_cred((task))->xxx; \
/linux-4.4.14/kernel/
Dcapability.c301 ret = security_capable(__task_cred(t), ns, cap); in has_ns_capability()
341 ret = security_capable_noaudit(__task_cred(t), ns, cap); in has_ns_capability_noaudit()
Dtsacct.c62 tcred = __task_cred(tsk); in bacct_add_tsk()
Dptrace.c259 tcred = __task_cred(task); in __ptrace_may_access()
278 !ptrace_has_cap(__task_cred(task)->user_ns, mode)) { in __ptrace_may_access()
347 if (ns_capable(__task_cred(task)->user_ns, CAP_SYS_PTRACE)) in ptrace_attach()
Dcred.c194 cred = __task_cred((task)); in get_task_cred()
Duser_namespace.c958 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
Dsignal.c371 user = get_uid(__task_cred(t)->user); in __sigqueue_alloc()
695 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred()
1322 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
Dsys.c137 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
1434 tcred = __task_cred(task); in check_prlimit_permission()
Dexit.c177 atomic_dec(&__task_cred(p)->user->processes); in release_task()
/linux-4.4.14/security/yama/
Dyama_lsm.c293 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
299 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
/linux-4.4.14/security/apparmor/include/
Dcontext.h114 return aa_cred_profile(__task_cred(task)); in __aa_task_profile()
/linux-4.4.14/security/apparmor/
Dresource.c98 task_profile = aa_get_profile(aa_cred_profile(__task_cred(task))); in aa_task_setrlimit()
Dlsm.c115 cred = __task_cred(target); in apparmor_capget()
/linux-4.4.14/arch/mips/kernel/
Dmips-mt-fpaff.c52 pcred = __task_cred(p); in check_same_owner()
/linux-4.4.14/block/
Dioprio.c39 tcred = __task_cred(task); in set_task_ioprio()
/linux-4.4.14/Documentation/security/
Dcredentials.txt394 const struct cred *__task_cred(struct task_struct *task);
403 tcred = __task_cred(t);
420 [*] Note: The result of __task_cred() should not be passed directly to
431 __task_cred(task)->uid
432 __task_cred(task)->euid
435 need to be accessed, RCU read lock should be used, __task_cred() called, the
/linux-4.4.14/security/smack/
Dsmack.h371 skp = smk_of_task(__task_cred(t)->security); in smk_of_task_struct()
Dsmack_lsm.c434 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
/linux-4.4.14/fs/proc/
Darray.c278 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig()
315 cred = __task_cred(p); in task_cap()
Dfd.c113 cred = __task_cred(task); in tid_fd_revalidate()
Dbase.c1669 cred = __task_cred(task); in proc_pid_make_inode()
1708 cred = __task_cred(task); in pid_getattr()
1750 cred = __task_cred(task); in pid_revalidate()
1876 cred = __task_cred(task); in map_files_d_revalidate()
/linux-4.4.14/drivers/connector/
Dcn_proc.c141 cred = __task_cred(task); in proc_id_connector()
/linux-4.4.14/fs/
Dfcntl.c439 cred = __task_cred(p); in sigio_perm()
Dbinfmt_elf_fdpic.c1436 cred = __task_cred(p); in fill_psinfo()
Dbinfmt_elf.c1470 cred = __task_cred(p); in fill_psinfo()
/linux-4.4.14/security/selinux/
Dhooks.c208 sid = cred_sid(__task_cred(task)); in task_sid()
1536 __tsec1 = __task_cred(tsk1)->security; sid1 = __tsec1->sid; in task_has_perm()
1537 __tsec2 = __task_cred(tsk2)->security; sid2 = __tsec2->sid; in task_has_perm()
2297 sec = __task_cred(tracer)->security; in selinux_bprm_set_creds()
5575 __tsec = __task_cred(p)->security; in selinux_getprocattr()
Dselinuxfs.c88 tsec = __task_cred(tsk)->security; in task_has_security()
/linux-4.4.14/security/keys/
Dkeyctl.c1505 pcred = __task_cred(parent); in keyctl_session_to_parent()
/linux-4.4.14/mm/
Dmigrate.c1512 tcred = __task_cred(task); in SYSCALL_DEFINE6()
Dmempolicy.c1384 tcred = __task_cred(task); in SYSCALL_DEFINE4()
/linux-4.4.14/Documentation/
Dkmemcheck.txt435 199 user = get_uid(__task_cred(t)->user);
/linux-4.4.14/kernel/sched/
Dcore.c3764 pcred = __task_cred(p); in check_same_owner()
4433 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in sched_setaffinity()
/linux-4.4.14/arch/ia64/kernel/
Dperfmon.c2367 tcred = __task_cred(task); in pfm_bad_permissions()