Home
last modified time | relevance | path

Searched refs:__task_cred (Results 1 – 25 of 30) sorted by relevance

12

/OK3568_Linux_fs/kernel/include/linux/
H A Dcred.h319 #define __task_cred(task) \ macro
366 ___val = __task_cred((task))->xxx; \
/OK3568_Linux_fs/kernel/kernel/
H A Dcapability.c300 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NONE); in has_ns_capability()
341 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NOAUDIT); in has_ns_capability_noaudit()
H A Dtsacct.c55 tcred = __task_cred(tsk); in bacct_add_tsk()
H A Dnsproxy.c407 user_ns = get_user_ns(__task_cred(tsk)->user_ns); in validate_nsset()
H A Dcred.c203 cred = __task_cred((task)); in get_task_cred()
H A Duser_namespace.c1304 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
H A Dptrace.c331 tcred = __task_cred(task); in __ptrace_may_access()
H A Dsignal.c431 user = __task_cred(t)->user; in __sigqueue_alloc()
818 const struct cred *tcred = __task_cred(t); in kill_ok_by_cred()
1485 const struct cred *pcred = __task_cred(target); in kill_as_cred_perm()
H A Dsys.c169 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm()
1619 tcred = __task_cred(task); in check_prlimit_permission()
H A Dexit.c192 atomic_dec(&__task_cred(p)->user->processes); in release_task()
/OK3568_Linux_fs/kernel/security/
H A Dcommoncap.c141 child_cred = __task_cred(child); in cap_ptrace_access_check()
176 cred = __task_cred(parent); in cap_ptrace_traceme()
206 cred = __task_cred(target); in cap_capget()
1113 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice()
1115 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
/OK3568_Linux_fs/kernel/security/yama/
H A Dyama_lsm.c371 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
377 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
/OK3568_Linux_fs/kernel/security/apparmor/include/
H A Dcred.h76 return aa_cred_raw_label(__task_cred(task)); in __aa_task_raw_label()
/OK3568_Linux_fs/kernel/arch/mips/kernel/
H A Dmips-mt-fpaff.c55 pcred = __task_cred(p); in check_same_owner()
/OK3568_Linux_fs/kernel/security/apparmor/
H A Dresource.c112 peer = aa_get_newest_cred_label(__task_cred(task)); in aa_task_setrlimit()
/OK3568_Linux_fs/kernel/Documentation/security/
H A Dcredentials.rst366 const struct cred *__task_cred(struct task_struct *task);
375 tcred = __task_cred(t);
393 The result of ``__task_cred()`` should not be passed directly to
404 __task_cred(task)->uid
405 __task_cred(task)->euid
408 need to be accessed, RCU read lock should be used, ``__task_cred()`` called,
/OK3568_Linux_fs/kernel/block/
H A Dioprio.c43 tcred = __task_cred(task); in set_task_ioprio()
/OK3568_Linux_fs/kernel/security/smack/
H A Dsmack.h394 cred = __task_cred(t); in smk_of_task_struct()
/OK3568_Linux_fs/kernel/fs/proc/
H A Darray.c286 qsize = atomic_read(&__task_cred(p)->user->sigpending); in task_sig()
324 cred = __task_cred(p); in task_cap()
H A Dbase.c1832 cred = __task_cred(task); in task_dump_owner()
2526 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_write()
2565 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_show()
/OK3568_Linux_fs/kernel/drivers/gpu/drm/
H A Ddrm_debugfs.c98 uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID; in drm_clients_info()
/OK3568_Linux_fs/kernel/drivers/connector/
H A Dcn_proc.c140 cred = __task_cred(task); in proc_id_connector()
/OK3568_Linux_fs/kernel/fs/
H A Dfcntl.c723 cred = __task_cred(p); in sigio_perm()
H A Dbinfmt_elf_fdpic.c1374 cred = __task_cred(p); in fill_psinfo()
/OK3568_Linux_fs/kernel/security/keys/
H A Dkeyctl.c1668 pcred = __task_cred(parent); in keyctl_session_to_parent()

12