| /linux-6.15/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 311 const struct cred *__task_cred(struct task_struct *task); 320 tcred = __task_cred(t); 337 ``__task_cred()`` 的结果不应直接传递给 ``get_cred()`` , 347 __task_cred(task)->uid 348 __task_cred(task)->euid 350 类似地,如果需要访问任务凭据的多个方面,应使用RCU读锁,调用 ``__task_cred()``
|
| /linux-6.15/include/linux/ |
| H A D | cred.h | 294 #define __task_cred(task) \ macro 341 ___val = __task_cred((task))->xxx; \
|
| /linux-6.15/kernel/ |
| H A D | capability.c | 282 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NONE); in has_ns_capability() 307 ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NOAUDIT); in has_ns_capability_noaudit()
|
| H A D | tsacct.c | 61 tcred = __task_cred(tsk); in bacct_add_tsk()
|
| H A D | nsproxy.c | 421 user_ns = get_user_ns(__task_cred(tsk)->user_ns); in validate_nsset()
|
| H A D | cred.c | 160 cred = __task_cred((task)); in get_task_cred()
|
| H A D | ptrace.c | 316 tcred = __task_cred(task); in __ptrace_may_access()
|
| H A D | user_namespace.c | 1335 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get()
|
| H A D | sys.c | 191 const struct cred *cred = current_cred(), *pcred = __task_cred(p); in set_one_prio_perm() 1686 tcred = __task_cred(task); in check_prlimit_permission()
|
| /linux-6.15/security/landlock/ |
| H A D | cred.h | 79 return landlock_cred(__task_cred(task))->domain; in landlock_get_task_domain()
|
| H A D | task.c | 144 parent_subject = landlock_cred(__task_cred(parent)); in hook_ptrace_traceme()
|
| /linux-6.15/security/yama/ |
| H A D | yama_lsm.c | 366 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 372 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
|
| /linux-6.15/security/ |
| H A D | commoncap.c | 172 child_cred = __task_cred(child); in cap_ptrace_access_check() 207 cred = __task_cred(parent); in cap_ptrace_traceme() 237 cred = __task_cred(target); in cap_capget() 1207 is_subset = cap_issubset(__task_cred(p)->cap_permitted, in cap_safe_nice() 1209 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
|
| /linux-6.15/arch/mips/kernel/ |
| H A D | mips-mt-fpaff.c | 56 pcred = __task_cred(p); in check_same_owner()
|
| /linux-6.15/security/apparmor/ |
| H A D | resource.c | 124 peer = aa_get_newest_cred_label(__task_cred(task)); in aa_task_setrlimit()
|
| H A D | task.c | 34 p = aa_get_newest_cred_label(__task_cred(task)); in aa_get_task_label()
|
| /linux-6.15/Documentation/security/ |
| H A D | credentials.rst | 366 const struct cred *__task_cred(struct task_struct *task); 375 tcred = __task_cred(t); 393 The result of ``__task_cred()`` should not be passed directly to 404 __task_cred(task)->uid 405 __task_cred(task)->euid 408 need to be accessed, RCU read lock should be used, ``__task_cred()`` called,
|
| /linux-6.15/security/smack/ |
| H A D | smack.h | 411 cred = __task_cred(t); in smk_of_task_struct_obj()
|
| /linux-6.15/block/ |
| H A D | blk-ioc.c | 250 tcred = __task_cred(task); in set_task_ioprio()
|
| /linux-6.15/kernel/sched/ |
| H A D | syscalls.c | 334 pcred = __task_cred(p); in check_same_owner() 1229 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in sched_setaffinity()
|
| /linux-6.15/drivers/connector/ |
| H A D | cn_proc.c | 188 cred = __task_cred(task); in proc_id_connector()
|
| /linux-6.15/drivers/gpu/drm/ |
| H A D | drm_debugfs.c | 102 uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID; in drm_clients_info()
|
| /linux-6.15/fs/proc/ |
| H A D | array.c | 318 cred = __task_cred(p); in task_cap()
|
| H A D | base.c | 1887 cred = __task_cred(task); in task_dump_owner() 2606 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_write() 2646 if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { in timerslack_ns_show()
|
| /linux-6.15/fs/ |
| H A D | fcntl.c | 835 cred = __task_cred(p); in sigio_perm()
|