Searched refs:parent (Results 1 - 19 of 19) sorted by relevance

/security/
H A Dinode.c59 * @parent: a pointer to the parent dentry for this file. This should be a
83 struct dentry *parent, void *data,
102 if (!parent)
103 parent = mount->mnt_root;
105 dir = parent->d_inode;
108 dentry = lookup_one_len(name, parent, strlen(name));
155 * @parent: a pointer to the parent dentry for this file. This should be a
171 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) argument
82 securityfs_create_file(const char *name, umode_t mode, struct dentry *parent, void *data, const struct file_operations *fops) argument
194 struct dentry *parent; local
[all...]
H A Ddevice_cgroup.c178 * parent's
185 struct dev_cgroup *parent_dev_cgroup = css_to_devcgroup(css->parent);
389 * verify_new_ex - verifies if a new exception is allowed by parent cgroup's permissions
395 * than its parent
418 * parent's exceptions, even slightly
434 * be contained completely in an parent's exception to be
442 /* parent has an exception that matches the proposed */
453 * must be allowed in the parent device
458 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); local
479 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); local
502 may_allow_all(struct dev_cgroup *parent) argument
610 struct dev_cgroup *parent = css_to_devcgroup(devcgroup->css.parent); local
[all...]
H A Dcommoncap.c101 /* Have we tried all of the parent namespaces? */
106 * The owner of the user namespace in the parent of the
109 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid))
113 * If you have a capability in a parent user ns, then you have
116 ns = ns->parent;
173 * @parent: The task proposed to be the tracer
175 * If parent is in the same or an ancestor user_ns and has all current's
177 * If parent has the ptrace capability to current's user_ns, then ptrace
184 int cap_ptrace_traceme(struct task_struct *parent) argument
190 cred = __task_cred(parent);
[all...]
H A Dsecurity.c169 int security_ptrace_traceme(struct task_struct *parent) argument
173 rc = yama_ptrace_traceme(parent);
177 return security_ops->ptrace_traceme(parent);
1281 void security_sock_graft(struct sock *sk, struct socket *parent) argument
1283 security_ops->sock_graft(sk, parent);
H A Dcapability.c711 static void cap_sock_graft(struct sock *sk, struct socket *parent) argument
/security/yama/
H A Dyama_lsm.c209 * @parent: the process to compare against while walking up from child
210 * @child: the process to start from while looking upwards for parent
212 * Returns 1 if child is a descendant of parent, 0 if not.
214 static int task_is_descendant(struct task_struct *parent, argument
220 if (!parent || !child)
224 if (!thread_group_leader(parent))
225 parent = rcu_dereference(parent->group_leader);
229 if (walker == parent) {
252 struct task_struct *parent local
336 yama_ptrace_traceme(struct task_struct *parent) argument
[all...]
/security/tomoyo/
H A Dtomoyo.c168 * @parent: Pointer to "struct path".
173 static int tomoyo_path_unlink(struct path *parent, struct dentry *dentry) argument
175 struct path path = { parent->mnt, dentry };
182 * @parent: Pointer to "struct path".
188 static int tomoyo_path_mkdir(struct path *parent, struct dentry *dentry, argument
191 struct path path = { parent->mnt, dentry };
199 * @parent: Pointer to "struct path".
204 static int tomoyo_path_rmdir(struct path *parent, struct dentry *dentry) argument
206 struct path path = { parent->mnt, dentry };
213 * @parent
219 tomoyo_path_symlink(struct path *parent, struct dentry *dentry, const char *old_name) argument
236 tomoyo_path_mknod(struct path *parent, struct dentry *dentry, umode_t mode, unsigned int dev) argument
[all...]
H A Dsecurityfs_if.c222 * @parent: The parent directory.
228 struct dentry *parent, const u8 key)
230 securityfs_create_file(name, mode, parent, ((u8 *) NULL) + key,
227 tomoyo_create_entry(const char *name, const umode_t mode, struct dentry *parent, const u8 key) argument
/security/apparmor/
H A Dpolicy.c41 * name before the // being the parent and the name after the child.
225 * @curr: namespace to treat as the parent (NOT NULL)
235 for ( ; view; view = view->parent) {
236 if (view->parent == curr)
269 * @prefix: parent namespace name (MAYBE NULL)
325 aa_put_namespace(ns->parent);
404 ns->parent = aa_get_namespace(root);
500 if (ns->parent)
501 __aa_update_replacedby(ns->unconfined, ns->parent->unconfined);
510 * Requires: ns->parent
688 aa_new_null_profile(struct aa_profile *parent, int hat) argument
764 aa_find_child(struct aa_profile *parent, const char *name) argument
1008 struct aa_profile *parent = aa_deref_parent(old); local
1145 struct dentry *parent; local
1183 struct aa_profile *parent, *newest; local
[all...]
H A Dapparmorfs.c401 int __aa_fs_profile_mkdir(struct aa_profile *profile, struct dentry *parent) argument
407 if (!parent) {
411 /* adding to parent that previously didn't have children */
415 prof_child_dir(p) = parent = dent;
431 dent = securityfs_create_dir(profile->dirname, parent);
501 int __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent, argument
512 dent = securityfs_create_dir(name, parent);
566 * Requires: ns->parent->lock to be held
572 struct aa_namespace *parent, *next; local
581 /* check if the next ns is a sibling, parent, g
627 struct aa_profile *parent; local
834 aafs_create_file(struct aa_fs_entry *fs_file, struct dentry *parent) argument
858 aafs_create_dir(struct aa_fs_entry *fs_dir, struct dentry *parent) argument
[all...]
H A Dlsm.c106 static int apparmor_ptrace_traceme(struct task_struct *parent) argument
108 int error = cap_ptrace_traceme(parent);
112 return aa_ptrace(parent, current, PTRACE_MODE_ATTACH);
H A Ddomain.c643 root = aa_get_profile_rcu(&profile->parent);
/security/integrity/
H A Diint.c95 struct rb_node *node, *parent = NULL; local
110 parent = *p;
111 test_iint = rb_entry(parent, struct integrity_iint_cache,
122 rb_link_node(node, parent, p);
/security/apparmor/include/
H A Dapparmorfs.h99 int __aa_fs_profile_mkdir(struct aa_profile *profile, struct dentry *parent);
101 int __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent,
H A Dpolicy.h107 * @parent: parent of namespace
132 struct aa_namespace *parent; member in struct:aa_namespace
164 * @parent: parent of profile
192 * a reference to their parent.
202 struct aa_profile __rcu *parent; member in struct:aa_profile
233 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child);
244 struct aa_profile *aa_new_null_profile(struct aa_profile *parent, int hat);
247 struct aa_profile *aa_find_child(struct aa_profile *parent, cons
[all...]
/security/keys/
H A Dkey.c57 struct rb_node *parent = NULL; local
66 parent = *p;
67 user = rb_entry(parent, struct key_user, node);
105 rb_link_node(&candidate->node, parent, p);
139 struct rb_node *parent, **p; local
153 parent = NULL;
157 parent = *p;
158 xkey = rb_entry(parent, struct key, serial_node);
169 rb_link_node(&key->serial_node, parent, p);
185 parent
[all...]
H A Dkeyctl.c1479 * parent process.
1482 * parent process must be single-threaded and must have the same effective
1485 * The keyring will be emplaced on the parent when it next resumes userspace.
1491 struct task_struct *me, *parent; local
1504 /* our parent is going to need a new cred struct, a new tgcred struct
1506 * our parent */
1522 parent = me->real_parent;
1524 /* the parent mustn't be init and mustn't be a kernel thread */
1525 if (parent->pid <= 1 || !parent
[all...]
/security/selinux/
H A Dhooks.c874 * if the parent was able to be mounted it clearly had no special lsm
1472 /* Commonly granted from child to parent. */
2007 static int selinux_ptrace_traceme(struct task_struct *parent) argument
2011 rc = cap_ptrace_traceme(parent);
2015 return task_has_perm(parent, current, PROCESS__PTRACE);
2395 /* Always clear parent death signal on SID transitions. */
2461 /* Wake up the parent if it is waiting so that it can recheck
4018 * @sk_sid: the parent socket's SID
4631 static void selinux_sock_graft(struct sock *sk, struct socket *parent) argument
4633 struct inode_security_struct *isec = SOCK_INODE(parent)
[all...]
/security/smack/
H A Dsmack_lsm.c406 * @ptp: parent task pointer
2025 * get marked with SMACK64EXEC and even if the parent
2026 * and child shouldn't be talking the parent still
3624 * Sets the netlabel socket state on sk from parent
3672 * @parent: parent socket
3677 static void smack_sock_graft(struct sock *sk, struct socket *parent) argument

Completed in 165 milliseconds