Searched refs:pid (Results 1 – 16 of 16) sorted by relevance
| /security/landlock/ |
| A D | domain.h | 47 struct pid *pid; member 136 put_pid(hierarchy->details->pid); in landlock_free_hierarchy_details()
|
| A D | domain.c | 103 details->pid = get_pid(task_tgid(current)); in get_current_details()
|
| A D | audit.c | 122 hierarchy->id, pid_nr(hierarchy->details->pid), in log_domain()
|
| A D | fs.c | 1791 p = pid_task(fown->pid, fown->pid_type); in control_current_fowner()
|
| /security/keys/ |
| A D | request_key_auth.c | 75 seq_printf(m, " pid:%d ci:%zu", rka->pid, rka->callout_len); in request_key_auth_describe() 200 rka->pid = irka->pid; in request_key_auth_new() 207 rka->pid = current->pid; in request_key_auth_new()
|
| A D | keyctl.c | 1663 if (parent->pid <= 1 || !parent->mm) in keyctl_session_to_parent()
|
| /security/tomoyo/ |
| A D | memory.c | 21 const pid_t pid = current->pid; in tomoyo_warn_oom() local 23 if (tomoyo_last_pid != pid) { in tomoyo_warn_oom() 25 tomoyo_last_pid = pid; in tomoyo_warn_oom()
|
| A D | realpath.c | 164 const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10); in tomoyo_get_local_path() local 167 if (*ep == '/' && pid && pid == in tomoyo_get_local_path()
|
| A D | common.c | 957 const pid_t pid = current->pid; in tomoyo_manager() local 959 if (last_pid != pid) { in tomoyo_manager() 962 last_pid = pid; in tomoyo_manager() 985 unsigned int pid; in tomoyo_select_domain() local 992 if (sscanf(data, "pid=%u", &pid) == 1 || in tomoyo_select_domain() 1000 p = find_task_by_vpid(pid); in tomoyo_select_domain() 1008 domain = tomoyo_find_domain_by_qid(pid); in tomoyo_select_domain() 1692 unsigned int pid; in tomoyo_read_pid() local 1706 if (kstrtouint(buf, 10, &pid)) in tomoyo_read_pid() 1710 p = find_task_by_pid_ns(pid, &init_pid_ns); in tomoyo_read_pid() [all …]
|
| A D | common.h | 1133 pid_t pid; in tomoyo_sys_getppid() local 1136 pid = task_tgid_vnr(rcu_dereference(current->real_parent)); in tomoyo_sys_getppid() 1138 return pid; in tomoyo_sys_getppid()
|
| /security/yama/ |
| A D | yama_lsm.c | 63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 64 info->agent->pid); in __report_access() 88 access, target->comm, target->pid, agent->comm, agent->pid); in report_access() 279 while (walker->pid > 0) { in task_is_descendant()
|
| /security/apparmor/ |
| A D | procattr.c | 130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat() 136 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat()
|
| /security/ |
| A D | lsm_audit.c | 275 pid_t pid = task_tgid_nr(tsk); in audit_log_lsm_data() local 276 if (pid) { in audit_log_lsm_data() 278 audit_log_format(ab, " opid=%d ocomm=", pid); in audit_log_lsm_data()
|
| A D | Kconfig | 23 prompt "Allow /proc/pid/mem access override" 26 Traditionally /proc/pid/mem allows users to override memory 36 bool "Traditional /proc/pid/mem behavior" 38 This allows /proc/pid/mem accesses to override memory mapping 44 This allows /proc/pid/mem accesses to override memory mapping
|
| A D | Kconfig.hardening | 145 in the /proc file system. In particular, /proc/<pid>/stack_depth
|
| /security/selinux/ |
| A D | selinuxfs.c | 713 comm, current->pid); in sel_write_checkreqprot() 1074 " userspace.\n", current->comm, current->pid); in sel_write_user()
|
Completed in 40 milliseconds