Lines Matching refs:task
425 static void __init lsm_early_task(struct task_struct *task);
479 init_debug("task blob size = %d\n", blob_sizes.lbs_task);
762 * lsm_task_alloc - allocate a composite task blob
763 * @task: the task that needs a blob
765 * Allocate the task blob for all the modules
769 static int lsm_task_alloc(struct task_struct *task)
771 return lsm_blob_alloc(&task->security, blob_sizes.lbs_task, GFP_KERNEL);
839 * lsm_early_task - during initialization allocate a composite task blob
840 * @task: the task that needs a blob
842 * Allocate the task blob for all the modules
844 static void __init lsm_early_task(struct task_struct *task)
846 int rc = lsm_task_alloc(task);
849 panic("%s: Early task alloc failed.\n", __func__);
989 * @mgr: task credentials of current binder process
3097 * @tsk: target task
3180 * security_task_alloc() - Allocate a task's LSM blob
3181 * @task: the task
3184 * Handle allocation of task-related resources.
3188 int security_task_alloc(struct task_struct *task, unsigned long clone_flags)
3190 int rc = lsm_task_alloc(task);
3194 rc = call_int_hook(task_alloc, task, clone_flags);
3196 security_task_free(task);
3201 * security_task_free() - Free a task's LSM blob and related resources
3202 * @task: task
3204 * Handle release of task-related resources. Note that this can be called from
3207 void security_task_free(struct task_struct *task)
3209 call_void_hook(task_free, task);
3211 kfree(task->security);
3212 task->security = NULL;
3330 * The current task must be the one that nominated @secid.
3345 * objective context of the specified inode. The current task must be the one
3502 * @p: task being modified
3517 * @p: task
3531 * @p: task
3543 * security_current_getlsmprop_subj() - Current task's subjective LSM data
3546 * Retrieve the subjective security identifier of the current task and return
3557 * security_task_getlsmprop_obj() - Get a task's objective LSM data
3558 * @p: target task
3572 * security_task_setnice() - Check if setting a task's nice value is allowed
3573 * @p: target task
3586 * security_task_setioprio() - Check if setting a task's ioprio is allowed
3587 * @p: target task
3600 * security_task_getioprio() - Check if getting a task's ioprio is allowed
3601 * @p: task
3614 * @cred: current task credentials
3615 * @tcred: target task credentials
3619 * another task.
3631 * @p: target task's group leader
3649 * @p: target task
3663 * @p: target task
3676 * @p: task
3741 * security_task_to_inode() - Set the security attributes of a task's inode
3742 * @p: task
3745 * Set the security attributes for an inode based on an associated task's
3914 * @target: target task
3919 * The @target task structure contains a pointer to the process that will be
4262 * security_getprocattr() - Read an attribute for a task
4263 * @p: the task
4268 * Read attribute @name for task @p and store it into @value if allowed.
4286 * security_setprocattr() - Set an attribute for a task
4292 * Write (set) the current task's attribute @name to @value, size @size if
4465 * @w_cred: credentials of the task that set the watch
4466 * @cred: credentials of the task which triggered the watch
4483 * security_watch_key() - Check if a task is allowed to watch for key events
5999 * Check if the current task, executing an io_uring operation, is allowed to
6012 * Check whether the current task is allowed to spawn a io_uring polling thread
6038 * Check whether the current task is allowed to call io_uring_setup().