Searched refs:child (Results 1 - 9 of 9) sorted by relevance

/security/yama/
H A Dyama_lsm.c209 * @parent: the process to compare against while walking up from child
210 * @child: the process to start from while looking upwards for parent
212 * Returns 1 if child is a descendant of parent, 0 if not.
215 struct task_struct *child)
218 struct task_struct *walker = child;
220 if (!parent || !child)
277 * @child: task that current task is attempting to ptrace
282 int yama_ptrace_access_check(struct task_struct *child, argument
290 rc = cap_ptrace_access_check(child, mode);
294 /* require ptrace target be a child o
214 task_is_descendant(struct task_struct *parent, struct task_struct *child) argument
[all...]
/security/apparmor/
H A Dapparmorfs.c354 struct aa_profile *child; local
360 list_for_each_entry(child, &profile->base.profiles, base.list)
361 __aa_fs_profile_rmdir(child);
403 struct aa_profile *child; local
460 list_for_each_entry(child, &profile->base.profiles, base.list) {
461 error = __aa_fs_profile_mkdir(child, prof_child_dir(profile));
480 struct aa_profile *child; local
486 list_for_each_entry(child, &ns->base.profiles, base.list)
487 __aa_fs_profile_rmdir(child);
505 struct aa_profile *child; local
[all...]
H A Dpolicy.c41 * name before the // being the parent and the name after the child.
980 struct aa_profile *child, *tmp; local
986 list_for_each_entry_safe(child, tmp, &lh, base.list) {
989 list_del_init(&child->base.list);
990 p = __find_child(&new->base.profiles, child->base.name);
992 /* @p replaces @child */
993 __replace_profile(child, p, share_replacedby);
997 /* inherit @child and its children */
1000 p = aa_deref_parent(child);
1001 rcu_assign_pointer(child
[all...]
H A Dlsm.c96 static int apparmor_ptrace_access_check(struct task_struct *child, argument
99 int error = cap_ptrace_access_check(child, mode);
103 return aa_ptrace(current, child, mode);
/security/apparmor/include/
H A Dpolicy.h233 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child);
/security/
H A Dcommoncap.c140 * @child: The process to be accessed
152 int cap_ptrace_access_check(struct task_struct *child, unsigned int mode) argument
159 child_cred = __task_cred(child);
H A Dsecurity.c158 int security_ptrace_access_check(struct task_struct *child, unsigned int mode) argument
162 rc = yama_ptrace_access_check(child, mode);
166 return security_ops->ptrace_access_check(child, mode);
/security/selinux/
H A Dxfrm.c458 for (iter = dst; iter != NULL; iter = iter->child) {
H A Dhooks.c1472 /* Commonly granted from child to parent. */
1989 static int selinux_ptrace_access_check(struct task_struct *child, argument
1994 rc = cap_ptrace_access_check(child, mode);
2000 u32 csid = task_sid(child);
2004 return current_has_perm(child, PROCESS__PTRACE);
4017 * selinux_conn_sid - Determine the child socket label for a connection
4369 /* server child socket */

Completed in 64 milliseconds