Searched refs:child (Results 1 – 9 of 9) sorted by relevance
/security/yama/ |
D | yama_lsm.c | 211 struct task_struct *child) in task_is_descendant() argument 214 struct task_struct *walker = child; in task_is_descendant() 216 if (!parent || !child) in task_is_descendant() 278 static int yama_ptrace_access_check(struct task_struct *child, in yama_ptrace_access_check() argument 291 if (!pid_alive(child)) in yama_ptrace_access_check() 293 if (!rc && !task_is_descendant(current, child) && in yama_ptrace_access_check() 294 !ptracer_exception_found(current, child) && in yama_ptrace_access_check() 295 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 301 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 315 child->pid, current->comm, current->pid); in yama_ptrace_access_check()
|
/security/apparmor/ |
D | apparmorfs.c | 355 struct aa_profile *child; in __aa_fs_profile_rmdir() local 361 list_for_each_entry(child, &profile->base.profiles, base.list) in __aa_fs_profile_rmdir() 362 __aa_fs_profile_rmdir(child); in __aa_fs_profile_rmdir() 406 struct aa_profile *child; in __aa_fs_profile_mkdir() local 463 list_for_each_entry(child, &profile->base.profiles, base.list) { in __aa_fs_profile_mkdir() 464 error = __aa_fs_profile_mkdir(child, prof_child_dir(profile)); in __aa_fs_profile_mkdir() 483 struct aa_profile *child; in __aa_fs_namespace_rmdir() local 489 list_for_each_entry(child, &ns->base.profiles, base.list) in __aa_fs_namespace_rmdir() 490 __aa_fs_profile_rmdir(child); in __aa_fs_namespace_rmdir() 508 struct aa_profile *child; in __aa_fs_namespace_mkdir() local [all …]
|
D | policy.c | 996 struct aa_profile *child, *tmp; in __replace_profile() local 1002 list_for_each_entry_safe(child, tmp, &lh, base.list) { in __replace_profile() 1005 list_del_init(&child->base.list); in __replace_profile() 1006 p = __find_child(&new->base.profiles, child->base.name); in __replace_profile() 1009 __replace_profile(child, p, share_replacedby); in __replace_profile() 1016 p = aa_deref_parent(child); in __replace_profile() 1017 rcu_assign_pointer(child->parent, aa_get_profile(new)); in __replace_profile() 1018 list_add_rcu(&child->base.list, &new->base.profiles); in __replace_profile()
|
D | lsm.c | 96 static int apparmor_ptrace_access_check(struct task_struct *child, in apparmor_ptrace_access_check() argument 99 return aa_ptrace(current, child, mode); in apparmor_ptrace_access_check()
|
/security/apparmor/include/ |
D | policy.h | 233 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child);
|
/security/ |
D | commoncap.c | 147 int cap_ptrace_access_check(struct task_struct *child, unsigned int mode) in cap_ptrace_access_check() argument 155 child_cred = __task_cred(child); in cap_ptrace_access_check()
|
D | security.c | 156 int security_ptrace_access_check(struct task_struct *child, unsigned int mode) in security_ptrace_access_check() argument 158 return call_int_hook(ptrace_access_check, 0, child, mode); in security_ptrace_access_check()
|
/security/selinux/ |
D | xfrm.c | 455 for (iter = dst; iter != NULL; iter = iter->child) { in selinux_xfrm_postroute_last()
|
D | hooks.c | 2042 static int selinux_ptrace_access_check(struct task_struct *child, in selinux_ptrace_access_check() argument 2047 u32 csid = task_sid(child); in selinux_ptrace_access_check() 2051 return current_has_perm(child, PROCESS__PTRACE); in selinux_ptrace_access_check()
|