Lines Matching defs:task
30 #include <linux/sched/task.h>
209 * initialise the security for the init task
256 * get the objective security ID of a task
258 static inline u32 task_sid_obj(const struct task_struct *task)
263 sid = cred_sid(__task_cred(task));
1617 /* Check whether a task is allowed to use a capability. */
1653 /* Check whether a task has a particular permission to an inode.
1721 /* Check whether a task can use an open file descriptor to
1794 /* Check whether a task can create a file. */
1838 /* Check whether a task can link, unlink, or rmdir a file/directory. */
1937 /* Check whether a task can perform a filesystem operation. */
2308 /* Default to the current task SID. */
2372 /* Make sure that anyone attempting to ptrace over a task that
2467 /* Close files for which the new task SID is not authorized. */
2475 * task's hard limit and the init task's soft limit.
2478 * controlled by the setrlimit check. The inclusion of the init task's
2519 * This must occur _after_ the task SID has been updated so that any
2538 * wait permission to the new task SID. */
3642 * Check whether a task has the ioctl permission and cmd
3974 /* task security operations */
3976 static int selinux_task_alloc(struct task_struct *task,
6476 /* Check for ptracing, and update the task SID if ok.
6937 * Check to see if the current task is allowed to override it's credentials
6949 * Check to see if the current task is allowed to create a new io_uring
7289 /* Set the security state for the initial task. */