Searched refs:child (Results 1 – 8 of 8) sorted by relevance
/security/yama/ |
D | yama_lsm.c | 175 struct task_struct *child) in task_is_descendant() argument 178 struct task_struct *walker = child; in task_is_descendant() 180 if (!parent || !child) in task_is_descendant() 241 static int yama_ptrace_access_check(struct task_struct *child, in yama_ptrace_access_check() argument 249 rc = cap_ptrace_access_check(child, mode); in yama_ptrace_access_check() 256 !task_is_descendant(current, child) && in yama_ptrace_access_check() 257 !ptracer_exception_found(current, child) && in yama_ptrace_access_check() 265 child->pid, in yama_ptrace_access_check()
|
/security/apparmor/ |
D | policy.c | 490 struct aa_profile *child, *tmp; in __replace_profile() local 503 list_for_each_entry_safe(child, tmp, &old->base.profiles, base.list) { in __replace_profile() 504 aa_put_profile(child->parent); in __replace_profile() 505 child->parent = aa_get_profile(new); in __replace_profile() 507 list_move(&child->base.list, &new->base.profiles); in __replace_profile()
|
D | lsm.c | 96 static int apparmor_ptrace_access_check(struct task_struct *child, in apparmor_ptrace_access_check() argument 99 int error = cap_ptrace_access_check(child, mode); in apparmor_ptrace_access_check() 103 return aa_ptrace(current, child, mode); in apparmor_ptrace_access_check()
|
/security/apparmor/include/ |
D | policy.h | 206 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child);
|
/security/ |
D | commoncap.c | 143 int cap_ptrace_access_check(struct task_struct *child, unsigned int mode) in cap_ptrace_access_check() argument 150 child_cred = __task_cred(child); in cap_ptrace_access_check()
|
D | security.c | 153 int security_ptrace_access_check(struct task_struct *child, unsigned int mode) in security_ptrace_access_check() argument 155 return security_ops->ptrace_access_check(child, mode); in security_ptrace_access_check()
|
/security/selinux/ |
D | xfrm.c | 457 dst_test = dst_test->child) { in selinux_xfrm_postroute_last()
|
D | hooks.c | 1920 static int selinux_ptrace_access_check(struct task_struct *child, in selinux_ptrace_access_check() argument 1925 rc = cap_ptrace_access_check(child, mode); in selinux_ptrace_access_check() 1931 u32 csid = task_sid(child); in selinux_ptrace_access_check() 1935 return current_has_perm(child, PROCESS__PTRACE); in selinux_ptrace_access_check()
|