Home
last modified time | relevance | path

Searched refs:access (Results 1 – 21 of 21) sorted by relevance

/security/landlock/
A Daudit.c89 const access_mask_t access) in log_blockers() argument
230 access_mask_t access; in test_get_denied_layer() local
232 access = LANDLOCK_ACCESS_FS_EXECUTE; in test_get_denied_layer()
254 KUNIT_EXPECT_EQ(test, access, in test_get_denied_layer()
268 KUNIT_EXPECT_EQ(test, access, 0); in test_get_denied_layer()
314 access_mask_t access; in test_get_layer_from_deny_masks() local
321 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
328 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks()
348 KUNIT_EXPECT_EQ(test, access, in test_get_layer_from_deny_masks()
363 if (request->access) { in is_valid_request()
[all …]
A Druleset.c253 this->layers[0].access |= (*layers)[0].access; in insert_rule()
290 .access = ~0, in build_check_layer()
294 BUILD_BUG_ON(layer.access < LANDLOCK_MASK_ACCESS_FS); in build_check_layer()
300 const access_mask_t access) in landlock_insert_rule() argument
303 .access = access, in landlock_insert_rule()
345 layers[0].access = walker_rule->layers[0].access; in merge_tree()
652 if (layer->access & BIT_ULL(access_bit)) in landlock_unmask_layers()
A Dfs.c934 log_request_parent1->access = access_masked_parent1; in is_access_to_paths_allowed()
1225 if (request1.access) { in current_check_refer_path()
1229 if (request2.access) { in current_check_refer_path()
1579 access_mask_t access = 0; in get_required_file_open_access() local
1585 access = LANDLOCK_ACCESS_FS_READ_FILE; in get_required_file_open_access()
1588 access |= LANDLOCK_ACCESS_FS_WRITE_FILE; in get_required_file_open_access()
1591 access |= LANDLOCK_ACCESS_FS_EXECUTE; in get_required_file_open_access()
1592 return access; in get_required_file_open_access()
1686 request.access = open_access_request; in hook_file_open()
1713 .access = LANDLOCK_ACCESS_FS_TRUNCATE, in hook_file_truncate()
[all …]
A DKconfig11 tailored access control policies. A Landlock security policy is a
12 set of access rights (e.g. open a file in read-only, make a
A Druleset.h37 access_mask_t access; member
205 const access_mask_t access);
A Daudit.h43 access_mask_t access; member
A Dnet.c191 .access = access_request, in current_check_access_socket()
/security/
A Ddevice_cgroup.c38 short access; member
118 walk->access |= ex->access; in dev_exception_add()
146 walk->access &= ~ex->access; in dev_exception_rm()
147 if (!walk->access) { in dev_exception_rm()
254 if (access & DEVCG_ACC_READ) in set_access()
342 if (access & (~ex->access)) in match_exception()
388 if (!(access & ex->access)) in match_exception_partial()
431 refex->access); in verify_new_ex()
446 refex->access); in verify_new_ex()
833 short access) in devcgroup_legacy_check_permission() argument
[all …]
A DKconfig11 bool "Restrict unprivileged access to the kernel syslog"
23 prompt "Allow /proc/pid/mem access override"
39 permissions if you have ptrace access rights.
42 bool "Require active ptrace() use for access override"
107 implement socket and networking access controls.
116 implement Infiniband access controls.
125 implement per-packet access controls based on labels
133 bool "Security hooks for pathname based access control"
136 This enables the security hooks for pathname based access control.
138 implement pathname based access controls.
A DKconfig.hardening254 immediate access fault.
/security/smack/
A DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
22 When access is granted by a rule with the "b" mode a
23 message about the access requested is generated. The
25 of access initially with the bringup mode set on the
29 access rule set once the behavior is well understood.
A Dsmack_access.c287 int smack_str_from_perm(char *string, int access) in smack_str_from_perm() argument
291 if (access & MAY_READ) in smack_str_from_perm()
293 if (access & MAY_WRITE) in smack_str_from_perm()
295 if (access & MAY_EXEC) in smack_str_from_perm()
297 if (access & MAY_APPEND) in smack_str_from_perm()
299 if (access & MAY_TRANSMUTE) in smack_str_from_perm()
301 if (access & MAY_LOCK) in smack_str_from_perm()
303 if (access & MAY_BRINGUP) in smack_str_from_perm()
A Dsmack_lsm.c2189 static int smk_curacc_on_task(struct task_struct *p, int access, in smk_curacc_on_task() argument
2198 rc = smk_curacc(skp, access, &ad); in smk_curacc_on_task()
2199 rc = smk_bu_task(p, access, rc); in smk_curacc_on_task()
3131 static int smk_curacc_shm(struct kern_ipc_perm *isp, int access) in smk_curacc_shm() argument
3141 rc = smk_curacc(ssp, access, &ad); in smk_curacc_shm()
3142 rc = smk_bu_current("shm", ssp, access, rc); in smk_curacc_shm()
3220 static int smk_curacc_sem(struct kern_ipc_perm *isp, int access) in smk_curacc_sem() argument
3230 rc = smk_curacc(ssp, access, &ad); in smk_curacc_sem()
3231 rc = smk_bu_current("sem", ssp, access, rc); in smk_curacc_sem()
3325 rc = smk_curacc(msp, access, &ad); in smk_curacc_msq()
[all …]
A Dsmack.h287 int smack_str_from_perm(char *string, int access);
/security/yama/
A Dyama_lsm.c47 const char *access; member
63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
75 static void report_access(const char *access, struct task_struct *target, in report_access() argument
88 access, target->comm, target->pid, agent->comm, agent->pid); in report_access()
98 info->access = access; in report_access()
A DKconfig9 access controls. Currently available is ptrace scope restriction.
/security/tomoyo/
A DKconfig11 This selects TOMOYO Linux, pathname-based access control.
24 Some programs access thousands of objects, so running
45 Say Y here if you want to activate access control as soon as built-in
/security/keys/
A DKconfig7 bool "Enable access key retention support"
11 access keys in the kernel.
18 a searchable sequence of keys. Each process is equipped with access
53 LSMs gets to rule on which admin-level processes get to access the
/security/ipe/
A Dpolicy_fs.c28 umode_t access; member
473 d = securityfs_create_file(f->name, f->access, policyfs, in ipe_new_policyfs_node()
A DKconfig18 allowing users to define a policy to enforce a trust-based access
/security/selinux/
A DKconfig45 This option collects access vector cache statistics to

Completed in 34 milliseconds