Symbol: __task_cred
arch/mips/kernel/mips-mt-fpaff.c
56
pcred = __task_cred(p);
block/blk-ioc.c
250
tcred = __task_cred(task);
drivers/connector/cn_proc.c
188
cred = __task_cred(task);
drivers/gpu/drm/drm_debugfs.c
106
uid = task ? __task_cred(task)->euid : GLOBAL_ROOT_UID;
fs/binfmt_elf.c
1557
cred = __task_cred(p);
fs/binfmt_elf_fdpic.c
1370
cred = __task_cred(p);
fs/fcntl.c
846
cred = __task_cred(p);
fs/nfs/dir.c
3077
pcred = __task_cred(parent);
fs/proc/array.c
317
cred = __task_cred(p);
fs/proc/base.c
1893
cred = __task_cred(task);
fs/proc/base.c
2615
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) {
fs/proc/base.c
2655
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) {
include/linux/cred.h
364
___val = __task_cred((task))->xxx; \
kernel/capability.c
282
ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NONE);
kernel/capability.c
307
ret = security_capable(__task_cred(t), ns, cap, CAP_OPT_NOAUDIT);
kernel/cred.c
133
cred = __task_cred((task));
kernel/events/core.c
13777
is_capable &= ns_capable(__task_cred(task)->user_ns, CAP_KILL);
kernel/nsproxy.c
438
user_ns = get_user_ns(__task_cred(tsk)->user_ns);
kernel/ptrace.c
316
tcred = __task_cred(task);
kernel/sched/syscalls.c
1206
if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
kernel/sched/syscalls.c
282
pcred = __task_cred(p);
kernel/signal.c
1488
const struct cred *pcred = __task_cred(target);
kernel/signal.c
786
const struct cred *tcred = __task_cred(t);
kernel/sys.c
1716
tcred = __task_cred(task);
kernel/sys.c
221
const struct cred *cred = current_cred(), *pcred = __task_cred(p);
kernel/tsacct.c
62
tcred = __task_cred(tsk);
kernel/user_namespace.c
1332
user_ns = get_user_ns(__task_cred(task)->user_ns);
security/apparmor/lsm.c
171
cred = __task_cred(target);
security/apparmor/resource.c
123
peer = aa_get_newest_cred_label(__task_cred(task));
security/apparmor/task.c
35
p = aa_get_newest_cred_label(__task_cred(task));
security/commoncap.c
1213
is_subset = cap_issubset(__task_cred(p)->cap_permitted,
security/commoncap.c
1215
if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE))
security/commoncap.c
172
child_cred = __task_cred(child);
security/commoncap.c
207
cred = __task_cred(parent);
security/commoncap.c
237
cred = __task_cred(target);
security/keys/keyctl.c
1673
pcred = __task_cred(parent);
security/landlock/cred.h
91
return landlock_cred(__task_cred(task))->domain;
security/landlock/task.c
144
parent_subject = landlock_cred(__task_cred(parent));
security/selinux/hooks.c
267
sid = cred_sid(__task_cred(task));
security/selinux/hooks.c
6562
crsec = selinux_cred(__task_cred(p));
security/smack/smack.h
428
cred = __task_cred(t);
security/smack/smack_lsm.c
1990
tcred = __task_cred(tsk);
security/smack/smack_lsm.c
429
tracercred = __task_cred(tracer);
security/yama/yama_lsm.c
366
!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
security/yama/yama_lsm.c
372
if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))