Searched refs:child (Results 1 - 9 of 9) sorted by relevance
/security/yama/ |
H A D | yama_lsm.c | 209 * @parent: the process to compare against while walking up from child 210 * @child: the process to start from while looking upwards for parent 212 * Returns 1 if child is a descendant of parent, 0 if not. 215 struct task_struct *child) 218 struct task_struct *walker = child; 220 if (!parent || !child) 277 * @child: task that current task is attempting to ptrace 282 int yama_ptrace_access_check(struct task_struct *child, argument 290 rc = cap_ptrace_access_check(child, mode); 294 /* require ptrace target be a child o 214 task_is_descendant(struct task_struct *parent, struct task_struct *child) argument [all...] |
/security/apparmor/ |
H A D | apparmorfs.c | 354 struct aa_profile *child; local 360 list_for_each_entry(child, &profile->base.profiles, base.list) 361 __aa_fs_profile_rmdir(child); 403 struct aa_profile *child; local 460 list_for_each_entry(child, &profile->base.profiles, base.list) { 461 error = __aa_fs_profile_mkdir(child, prof_child_dir(profile)); 480 struct aa_profile *child; local 486 list_for_each_entry(child, &ns->base.profiles, base.list) 487 __aa_fs_profile_rmdir(child); 505 struct aa_profile *child; local [all...] |
H A D | policy.c | 41 * name before the // being the parent and the name after the child. 980 struct aa_profile *child, *tmp; local 986 list_for_each_entry_safe(child, tmp, &lh, base.list) { 989 list_del_init(&child->base.list); 990 p = __find_child(&new->base.profiles, child->base.name); 992 /* @p replaces @child */ 993 __replace_profile(child, p, share_replacedby); 997 /* inherit @child and its children */ 1000 p = aa_deref_parent(child); 1001 rcu_assign_pointer(child [all...] |
H A D | lsm.c | 96 static int apparmor_ptrace_access_check(struct task_struct *child, argument 99 int error = cap_ptrace_access_check(child, mode); 103 return aa_ptrace(current, child, mode);
|
/security/apparmor/include/ |
H A D | policy.h | 233 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child);
|
/security/ |
H A D | commoncap.c | 140 * @child: The process to be accessed 152 int cap_ptrace_access_check(struct task_struct *child, unsigned int mode) argument 159 child_cred = __task_cred(child);
|
H A D | security.c | 158 int security_ptrace_access_check(struct task_struct *child, unsigned int mode) argument 162 rc = yama_ptrace_access_check(child, mode); 166 return security_ops->ptrace_access_check(child, mode);
|
/security/selinux/ |
H A D | xfrm.c | 458 for (iter = dst; iter != NULL; iter = iter->child) {
|
H A D | hooks.c | 1472 /* Commonly granted from child to parent. */ 1989 static int selinux_ptrace_access_check(struct task_struct *child, argument 1994 rc = cap_ptrace_access_check(child, mode); 2000 u32 csid = task_sid(child); 2004 return current_has_perm(child, PROCESS__PTRACE); 4017 * selinux_conn_sid - Determine the child socket label for a connection 4369 /* server child socket */
|
Completed in 64 milliseconds