Lines Matching full:credentials
2 /* Task credentials management - see Documentation/security/credentials.rst
42 * The initial credentials for the initial task
66 * The RCU callback to actually dispose of a set of credentials
93 * __put_cred - Destroy a set of credentials
96 * Destroy a set of credentials on which no references remain.
115 * Clean up a task's credentials when it exits
139 * get_task_cred - Get another task's objective credentials
142 * Get the objective credentials of a task, pinning them so that they can't go
143 * away. Accessing a task's credentials directly is not permitted.
165 * Allocate blank credentials, such that the credentials can be filled in at a
188 * prepare_creds - Prepare a new set of credentials for modification
190 * Prepare a new set of task credentials for modification. A task's creds
249 * Prepare credentials for current to perform an execve()
277 * Copy credentials for the new process created by fork()
282 * The new process gets the current process's subjective credentials as its
283 * objective and subjective credentials
354 /* If the two credentials are in the same user namespace see if in cred_cap_issubset()
360 /* The credentials are in a different user namespaces in cred_cap_issubset()
375 * commit_creds - Install new credentials upon the current task
376 * @new: The credentials to be assigned
378 * Install a new set of credentials to the current task, using RCU to replace
379 * the old set. Both the objective and the subjective credentials pointers are
380 * updated. This function may not be called if the subjective credentials are
383 * This function eats the caller's reference to the new credentials.
460 * abort_creds - Discard a set of credentials and unlock the current task
461 * @new: The credentials that were going to be applied
463 * Discard a set of credentials that were under construction and unlock the
477 * override_creds - Override the current process's subjective credentials
478 * @new: The credentials to be assigned
480 * Install a set of temporary override subjective credentials on the current
508 * revert_creds - Revert a temporary subjective credentials override
509 * @old: The credentials to be restored
511 * Revert a temporary set of override subjective credentials to an old set,
527 * cred_fscmp - Compare two credentials with respect to filesystem access.
531 * cred_cmp() will return zero if both credentials have the same
534 * If the credentials are different, then either -1 or 1 will
536 * respectively in an arbitrary, but stable, ordering of credentials.
601 * initialise the credentials stuff
605 /* allocate a slab in which we can store credentials */ in cred_init()
611 * prepare_kernel_cred - Prepare a set of credentials for a kernel service
614 * Prepare a set of credentials for a kernel service. This can then be used to
615 * override a task's own credentials so that work can be done on behalf of that
624 * Returns the new credentials or NULL if out of memory.
678 * set_security_override - Set the security ID in a set of credentials
679 * @new: The credentials to alter
682 * Set the LSM security ID in a set of credentials so that the subjective
683 * security is overridden when an alternative set of credentials is used.
692 * set_security_override_from_ctx - Set the security ID in a set of credentials
693 * @new: The credentials to alter
696 * Set the LSM security ID in a set of credentials so that the subjective
697 * security is overridden when an alternative set of credentials is used. The
715 * set_create_files_as - Set the LSM file create context in a set of credentials
716 * @new: The credentials to alter
719 * Change the LSM file creation context in a set of credentials to be the same