Searched refs:child (Results 1 – 9 of 9) sorted by relevance
/security/yama/ |
D | yama_lsm.c | 273 struct task_struct *child) in task_is_descendant() argument 276 struct task_struct *walker = child; in task_is_descendant() 278 if (!parent || !child) in task_is_descendant() 354 static int yama_ptrace_access_check(struct task_struct *child, in yama_ptrace_access_check() argument 367 if (!pid_alive(child)) in yama_ptrace_access_check() 369 if (!rc && !task_is_descendant(current, child) && in yama_ptrace_access_check() 370 !ptracer_exception_found(current, child) && in yama_ptrace_access_check() 371 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 377 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 389 report_access("attach", child, current); in yama_ptrace_access_check()
|
/security/apparmor/ |
D | policy.c | 742 struct aa_profile *child, *tmp; in __replace_profile() local 748 list_for_each_entry_safe(child, tmp, &lh, base.list) { in __replace_profile() 751 list_del_init(&child->base.list); in __replace_profile() 752 p = __find_child(&new->base.profiles, child->base.name); in __replace_profile() 755 __replace_profile(child, p); in __replace_profile() 762 p = aa_deref_parent(child); in __replace_profile() 763 rcu_assign_pointer(child->parent, aa_get_profile(new)); in __replace_profile() 764 list_add_rcu(&child->base.list, &new->base.profiles); in __replace_profile()
|
D | apparmorfs.c | 1418 struct aa_profile *child; in __aafs_profile_rmdir() local 1424 list_for_each_entry(child, &profile->base.profiles, base.list) in __aafs_profile_rmdir() 1425 __aafs_profile_rmdir(child); in __aafs_profile_rmdir() 1582 struct aa_profile *child; in __aafs_profile_mkdir() local 1672 list_for_each_entry(child, &profile->base.profiles, base.list) { in __aafs_profile_mkdir() 1673 error = __aafs_profile_mkdir(child, prof_child_dir(profile)); in __aafs_profile_mkdir() 1803 struct aa_profile *child; in __aafs_ns_rmdir() local 1810 list_for_each_entry(child, &ns->base.profiles, base.list) in __aafs_ns_rmdir() 1811 __aafs_profile_rmdir(child); in __aafs_ns_rmdir() 1912 struct aa_profile *child; in __aafs_ns_mkdir() local [all …]
|
D | label.c | 2121 struct aa_ns *child; in __aa_labelset_update_subtree() local 2128 list_for_each_entry(child, &ns->sub_ns, base.list) { in __aa_labelset_update_subtree() 2129 mutex_lock_nested(&child->lock, child->level); in __aa_labelset_update_subtree() 2130 __aa_labelset_update_subtree(child); in __aa_labelset_update_subtree() 2131 mutex_unlock(&child->lock); in __aa_labelset_update_subtree()
|
D | lsm.c | 105 static int apparmor_ptrace_access_check(struct task_struct *child, in apparmor_ptrace_access_check() argument 112 tracee = aa_get_task_label(child); in apparmor_ptrace_access_check()
|
/security/apparmor/include/ |
D | policy_ns.h | 84 const char *aa_ns_name(struct aa_ns *parent, struct aa_ns *child, bool subns);
|
/security/ |
D | commoncap.c | 133 int cap_ptrace_access_check(struct task_struct *child, unsigned int mode) in cap_ptrace_access_check() argument 141 child_cred = __task_cred(child); in cap_ptrace_access_check()
|
D | security.c | 696 int security_ptrace_access_check(struct task_struct *child, unsigned int mode) in security_ptrace_access_check() argument 698 return call_int_hook(ptrace_access_check, 0, child, mode); in security_ptrace_access_check()
|
/security/selinux/ |
D | hooks.c | 2130 static int selinux_ptrace_access_check(struct task_struct *child, in selinux_ptrace_access_check() argument 2134 u32 csid = task_sid(child); in selinux_ptrace_access_check()
|