Home
last modified time | relevance | path

Searched refs:pid (Results 1 – 16 of 16) sorted by relevance

/security/landlock/
A Ddomain.h47 struct pid *pid; member
136 put_pid(hierarchy->details->pid); in landlock_free_hierarchy_details()
A Ddomain.c103 details->pid = get_pid(task_tgid(current)); in get_current_details()
A Daudit.c122 hierarchy->id, pid_nr(hierarchy->details->pid), in log_domain()
A Dfs.c1791 p = pid_task(fown->pid, fown->pid_type); in control_current_fowner()
/security/keys/
A Drequest_key_auth.c75 seq_printf(m, " pid:%d ci:%zu", rka->pid, rka->callout_len); in request_key_auth_describe()
200 rka->pid = irka->pid; in request_key_auth_new()
207 rka->pid = current->pid; in request_key_auth_new()
A Dkeyctl.c1663 if (parent->pid <= 1 || !parent->mm) in keyctl_session_to_parent()
/security/tomoyo/
A Dmemory.c21 const pid_t pid = current->pid; in tomoyo_warn_oom() local
23 if (tomoyo_last_pid != pid) { in tomoyo_warn_oom()
25 tomoyo_last_pid = pid; in tomoyo_warn_oom()
A Drealpath.c164 const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10); in tomoyo_get_local_path() local
167 if (*ep == '/' && pid && pid == in tomoyo_get_local_path()
A Dcommon.c957 const pid_t pid = current->pid; in tomoyo_manager() local
959 if (last_pid != pid) { in tomoyo_manager()
962 last_pid = pid; in tomoyo_manager()
985 unsigned int pid; in tomoyo_select_domain() local
992 if (sscanf(data, "pid=%u", &pid) == 1 || in tomoyo_select_domain()
1000 p = find_task_by_vpid(pid); in tomoyo_select_domain()
1008 domain = tomoyo_find_domain_by_qid(pid); in tomoyo_select_domain()
1692 unsigned int pid; in tomoyo_read_pid() local
1706 if (kstrtouint(buf, 10, &pid)) in tomoyo_read_pid()
1710 p = find_task_by_pid_ns(pid, &init_pid_ns); in tomoyo_read_pid()
[all …]
A Dcommon.h1133 pid_t pid; in tomoyo_sys_getppid() local
1136 pid = task_tgid_vnr(rcu_dereference(current->real_parent)); in tomoyo_sys_getppid()
1138 return pid; in tomoyo_sys_getppid()
/security/yama/
A Dyama_lsm.c63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
64 info->agent->pid); in __report_access()
88 access, target->comm, target->pid, agent->comm, agent->pid); in report_access()
279 while (walker->pid > 0) { in task_is_descendant()
/security/apparmor/
A Dprocattr.c130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat()
136 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat()
/security/
A Dlsm_audit.c275 pid_t pid = task_tgid_nr(tsk); in audit_log_lsm_data() local
276 if (pid) { in audit_log_lsm_data()
278 audit_log_format(ab, " opid=%d ocomm=", pid); in audit_log_lsm_data()
A DKconfig23 prompt "Allow /proc/pid/mem access override"
26 Traditionally /proc/pid/mem allows users to override memory
36 bool "Traditional /proc/pid/mem behavior"
38 This allows /proc/pid/mem accesses to override memory mapping
44 This allows /proc/pid/mem accesses to override memory mapping
A DKconfig.hardening145 in the /proc file system. In particular, /proc/<pid>/stack_depth
/security/selinux/
A Dselinuxfs.c713 comm, current->pid); in sel_write_checkreqprot()
1074 " userspace.\n", current->comm, current->pid); in sel_write_user()

Completed in 40 milliseconds