Lines Matching defs:task
329 static void __init lsm_early_task(struct task_struct *task);
380 init_debug("task blob size = %d\n", blob_sizes.lbs_task);
640 * lsm_task_alloc - allocate a composite task blob
641 * @task: the task that needs a blob
643 * Allocate the task blob for all the modules
647 static int lsm_task_alloc(struct task_struct *task)
650 task->security = NULL;
654 task->security = kzalloc(blob_sizes.lbs_task, GFP_KERNEL);
655 if (task->security == NULL)
703 * lsm_early_task - during initialization allocate a composite task blob
704 * @task: the task that needs a blob
706 * Allocate the task blob for all the modules
708 static void __init lsm_early_task(struct task_struct *task)
710 int rc = lsm_task_alloc(task);
713 panic("%s: Early task alloc failed.\n", __func__);
792 * @mgr: task credentials of current binder process
2809 * @tsk: target task
2877 * security_task_alloc() - Allocate a task's LSM blob
2878 * @task: the task
2881 * Handle allocation of task-related resources.
2885 int security_task_alloc(struct task_struct *task, unsigned long clone_flags)
2887 int rc = lsm_task_alloc(task);
2891 rc = call_int_hook(task_alloc, 0, task, clone_flags);
2893 security_task_free(task);
2898 * security_task_free() - Free a task's LSM blob and related resources
2899 * @task: task
2901 * Handle release of task-related resources. Note that this can be called from
2904 void security_task_free(struct task_struct *task)
2906 call_void_hook(task_free, task);
2908 kfree(task->security);
2909 task->security = NULL;
3012 * The current task must be the one that nominated @secid.
3027 * objective context of the specified inode. The current task must be the one
3210 * @p: task being modified
3225 * @p: task
3239 * @p: task
3251 * security_current_getsecid_subj() - Get the current task's subjective secid
3254 * Retrieve the subjective security identifier of the current task and return
3265 * security_task_getsecid_obj() - Get a task's objective secid
3266 * @p: target task
3280 * security_task_setnice() - Check if setting a task's nice value is allowed
3281 * @p: target task
3294 * security_task_setioprio() - Check if setting a task's ioprio is allowed
3295 * @p: target task
3308 * security_task_getioprio() - Check if getting a task's ioprio is allowed
3309 * @p: task
3322 * @cred: current task credentials
3323 * @tcred: target task credentials
3327 * another task.
3339 * @p: target task's group leader
3357 * @p: target task
3371 * @p: target task
3384 * @p: task
3449 * security_task_to_inode() - Set the security attributes of a task's inode
3450 * @p: task
3453 * Set the security attributes for an inode based on an associated task's
3622 * @target: target task
3627 * The @target task structure contains a pointer to the process that will be
3822 * security_getprocattr() - Read an attribute for a task
3823 * @p: the task
3828 * Read attribute @name for task @p and store it into @value if allowed.
3846 * security_setprocattr() - Set an attribute for a task
3852 * Write (set) the current task's attribute @name to @value, size @size if
4052 * @w_cred: credentials of the task that set the watch
4053 * @cred: credentials of the task which triggered the watch
4070 * security_watch_key() - Check if a task is allowed to watch for key events
5372 * Check if the current task, executing an io_uring operation, is allowed to
5385 * Check whether the current task is allowed to spawn a io_uring polling thread