| /linux/include/linux/ |
| A D | cred.h | 289 #define current_cred() \ macro 322 (get_cred(current_cred())) 334 __cred = current_cred(); \ 349 __cred = current_cred(); \ 369 current_cred()->xxx; \ 398 __cred = current_cred(); \ 406 __cred = current_cred(); \ 414 __cred = current_cred(); \
|
| /linux/security/ |
| A D | commoncap.c | 142 cred = current_cred(); in cap_ptrace_access_check() 179 child_cred = current_cred(); in cap_ptrace_traceme() 225 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 792 const struct cred *old = current_cred(); in handle_privileged_root() 889 const struct cred *old = current_cred(); in cap_bprm_creds_from_file() 1179 current_cred()->cap_permitted); in cap_safe_nice() 1269 const struct cred *old = current_cred(); in cap_task_prctl() 1305 || (cap_capable(current_cred(), in cap_task_prctl() 1306 current_cred()->user_ns, in cap_task_prctl() 1363 return !!cap_raised(current_cred()->cap_ambient, arg3); in cap_task_prctl() [all …]
|
| /linux/kernel/ |
| A D | groups.c | 144 old = current_cred(); in set_current_groups() 163 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 229 const struct cred *cred = current_cred(); in in_group_p() 241 const struct cred *cred = current_cred(); in in_egroup_p()
|
| A D | uid16.c | 66 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 89 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 156 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2()
|
| A D | capability.c | 255 ret = security_capset(new, current_cred(), in SYSCALL_DEFINE2() 260 audit_log_capset(new, current_cred()); in SYSCALL_DEFINE2() 362 capable = security_capable(current_cred(), ns, cap, opts); in ns_capable_common()
|
| A D | sys.c | 231 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 301 const struct cred *cred = current_cred(); in SYSCALL_DEFINE2() 400 old = current_cred(); in __sys_setregid() 462 old = current_cred(); in __sys_setgid() 557 old = current_cred(); in __sys_setreuid() 634 old = current_cred(); in __sys_setuid() 698 old = current_cred(); in __sys_setresuid() 758 const struct cred *cred = current_cred(); in SYSCALL_DEFINE3() 798 old = current_cred(); in __sys_setresgid() 879 old = current_cred(); in __sys_setfsuid() [all …]
|
| /linux/security/keys/ |
| A D | persistent.c | 24 current_cred(), in key_create_persistent_register() 58 uid, INVALID_GID, current_cred(), in key_create_persistent() 111 ret = key_task_permission(persistent_ref, current_cred(), KEY_NEED_LINK); in key_get_persistent()
|
| A D | request_key.c | 122 const struct cred *cred = current_cred(); in call_sbin_request_key() 268 const struct cred *cred = current_cred(); in construct_get_dest_keyring() 588 .cred = current_cred(), in request_key_and_link() 623 ret = key_task_permission(key_ref, current_cred(), in request_key_and_link() 791 .cred = current_cred(), in request_key_rcu()
|
| A D | request_key_auth.c | 166 const struct cred *cred = current_cred(); in request_key_auth_new() 252 .cred = current_cred(), in key_get_instantiation_authkey()
|
| A D | process_keys.c | 77 const struct cred *cred = current_cred(); in look_up_user_keyrings() 554 ctx->cred == current_cred() && in search_process_keyrings_rcu() 847 old = current_cred(); in join_session_keyring() 913 const struct cred *old = current_cred(); in key_change_session_keyring()
|
| A D | internal.h | 191 post_watch_notification(key->watchers, &n.watch, current_cred(), in notify_key() 202 return key_task_permission(key_ref, current_cred(), need_perm); in key_permission()
|
| /linux/security/apparmor/ |
| A D | lsm.c | 133 error = aa_may_ptrace(current_cred(), tracer, cred, tracee, in apparmor_ptrace_access_check() 414 error = aa_path_perm(OP_RENAME_SRC, current_cred(), in apparmor_path_rename() 420 error = aa_path_perm(OP_RENAME_DEST, current_cred(), in apparmor_path_rename() 427 error = aa_path_perm(OP_RENAME_SRC, current_cred(), in apparmor_path_rename() 433 error = aa_path_perm(OP_RENAME_DEST, current_cred(), in apparmor_path_rename() 722 error = aa_bind_mount(current_cred(), label, path, in apparmor_sb_mount() 726 error = aa_mount_change_type(current_cred(), label, in apparmor_sb_mount() 732 error = aa_new_mount(current_cred(), label, dev_name, in apparmor_sb_mount() 762 error = aa_umount(current_cred(), label, mnt, flags); in apparmor_sb_umount() 1048 ad.subj_cred = current_cred(); in apparmor_userns_create() [all …]
|
| /linux/security/integrity/ima/ |
| A D | ima_main.c | 455 ret = process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap() 462 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap() 504 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 507 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 547 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check() 572 return process_measurement(file, current_cred(), secid, NULL, 0, in ima_file_check() 792 return process_measurement(file, current_cred(), secid, NULL, in ima_read_file() 835 return process_measurement(file, current_cred(), secid, buf, size, in ima_post_read_file() 994 action = ima_get_action(idmap, inode, current_cred(), in process_buffer_measurement()
|
| A D | ima_mok.c | 37 KUIDT_INIT(0), KGIDT_INIT(0), current_cred(), in ima_mok_init()
|
| /linux/security/landlock/ |
| A D | cred.h | 31 return landlock_cred(current_cred())->domain; in landlock_get_current_domain()
|
| /linux/security/selinux/ |
| A D | hooks.c | 633 const struct cred *cred = current_cred(); in selinux_set_mnt_opts() 2149 const struct cred *cred = current_cred(); in selinux_quotactl() 2184 const struct cred *cred = current_cred(); in selinux_quota_on() 2303 old_tsec = selinux_cred(current_cred()); in selinux_bprm_creds_for_exec() 2737 const struct cred *cred = current_cred(); in selinux_sb_kern_mount() 2747 const struct cred *cred = current_cred(); in selinux_sb_statfs() 2761 const struct cred *cred = current_cred(); in selinux_mount() 2773 const struct cred *cred = current_cred(); in selinux_move_mount() 2780 const struct cred *cred = current_cred(); in selinux_umount() 3056 const struct cred *cred = current_cred(); in selinux_inode_readlink() [all …]
|
| /linux/certs/ |
| A D | system_keyring.c | 232 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(), in system_trusted_keyring_init() 243 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(), in system_trusted_keyring_init()
|
| /linux/crypto/asymmetric_keys/ |
| A D | selftest.c | 27 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, current_cred(), in fips_signature_selftest()
|
| /linux/include/rdma/ |
| A D | ib.h | 78 return filp->f_cred == current_cred(); in ib_safe_file_access()
|
| /linux/fs/verity/ |
| A D | signature.c | 132 current_cred(), KEY_POS_SEARCH | in fsverity_init_signature()
|
| /linux/security/apparmor/include/ |
| A D | cred.h | 96 return aa_cred_raw_label(current_cred()); in aa_current_raw_label()
|
| /linux/fs/ |
| A D | nsfs.c | 110 f = dentry_open(&path, O_RDONLY, current_cred()); in open_namespace() 294 f = dentry_open(&path, O_RDONLY, current_cred()); in ns_ioctl()
|
| /linux/security/selinux/include/ |
| A D | objsec.h | 187 const struct task_security_struct *tsec = selinux_cred(current_cred()); in current_sid()
|
| /linux/fs/ecryptfs/ |
| A D | kthread.c | 63 (O_RDWR | O_LARGEFILE), current_cred()); in ecryptfs_threadfn()
|
| /linux/security/smack/ |
| A D | smack_access.c | 273 struct task_smack *tsp = smack_cred(current_cred()); in smk_curacc() 695 return smack_privileged_cred(cap, current_cred()); in smack_privileged()
|