| /security/apparmor/ |
| A D | policy_ns.c | 48 for ( ; view; view = view->parent) { in aa_ns_visible() 49 if (view->parent == curr) in aa_ns_visible() 155 aa_put_ns(ns->parent); in aa_free_ns() 222 AA_BUG(!parent); in __aa_create_ns() 224 AA_BUG(!mutex_is_locked(&parent->lock)); in __aa_create_ns() 229 ns->level = parent->level + 1; in __aa_create_ns() 239 ns->parent = aa_get_ns(parent); in __aa_create_ns() 286 mutex_lock_nested(&parent->lock, parent->level); in aa_prepare_ns() 292 mutex_unlock(&parent->lock); in aa_prepare_ns() 316 if (ns->parent) { in destroy_ns() [all …]
|
| A D | policy.c | 525 parent = profile; in __create_missing_ancestors() 537 if (!parent) in __create_missing_ancestors() 664 if (parent) { in aa_alloc_null() 669 rcu_assign_pointer(profile->parent, aa_get_profile(parent)); in aa_alloc_null() 701 AA_BUG(!parent); in aa_new_learning_profile() 1004 rcu_assign_pointer(new->parent, aa_get_profile(parent)); in __replace_profile() 1061 parent = rcu_dereference_protected(new->parent, in update_to_newest_parent() 1066 if (newest != parent) { in update_to_newest_parent() 1067 aa_put_profile(parent); in update_to_newest_parent() 1235 struct dentry *parent; in aa_replace_profiles() local [all …]
|
| A D | apparmorfs.c | 274 AA_BUG(!parent); in aafs_create() 1699 if (!parent) { in __aafs_profile_mkdir() 1829 mutex_lock_nested(&parent->lock, parent->level); in ns_mkdir_op() 1879 mutex_lock_nested(&parent->lock, parent->level); in ns_rmdir_op() 2037 AA_BUG(!parent); in __aafs_ns_mkdir() 2110 parent = ns->parent; in __next_ns() 2118 ns = parent; in __next_ns() 2119 parent = parent->parent; in __next_ns() 2169 parent = rcu_dereference_protected(p->parent, in __next_profile() 2175 p = parent; in __next_profile() [all …]
|
| A D | label.c | 675 struct rb_node **new, *parent = NULL; in __label_insert() local 689 parent = *new; in __label_insert() 710 rb_link_node(&label->node, parent, new); in __label_insert() 1968 ns_unconfined(labels_ns(this)->parent)); in aa_labelset_destroy()
|
| A D | domain.c | 1064 root = aa_get_profile_rcu(&profile->parent); in build_change_hat() 1128 root = aa_get_profile_rcu(&profile->parent); in change_hat()
|
| /security/yama/ |
| A D | yama_lsm.c | 267 static int task_is_descendant(struct task_struct *parent, in task_is_descendant() argument 273 if (!parent || !child) in task_is_descendant() 277 if (!thread_group_leader(parent)) in task_is_descendant() 278 parent = rcu_dereference(parent->group_leader); in task_is_descendant() 282 if (walker == parent) { in task_is_descendant() 305 struct task_struct *parent = NULL; in ptracer_exception_found() local 314 parent = ptrace_parent(tracee); in ptracer_exception_found() 315 if (parent != NULL && same_thread_group(parent, tracer)) { in ptracer_exception_found() 327 parent = relation->tracer; in ptracer_exception_found() 333 if (found && (parent == NULL || task_is_descendant(parent, tracer))) in ptracer_exception_found() [all …]
|
| /security/ |
| A D | inode.c | 108 struct dentry *parent, void *data, in securityfs_create_dentry() argument 122 if (!parent) { in securityfs_create_dentry() 127 parent = mount->mnt_root; in securityfs_create_dentry() 130 dir = d_inode(parent); in securityfs_create_dentry() 133 dentry = lookup_noperm(&QSTR(name), parent); in securityfs_create_dentry() 203 struct dentry *parent, void *data, in securityfs_create_file() argument 206 return securityfs_create_dentry(name, mode, parent, data, fops, NULL); in securityfs_create_file() 230 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) in securityfs_create_dir() argument 232 return securityfs_create_file(name, S_IFDIR | 0755, parent, NULL, NULL); in securityfs_create_dir() 263 struct dentry *parent, in securityfs_create_symlink() argument [all …]
|
| A D | device_cgroup.c | 465 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); in parent_has_perm() local 467 if (!parent) in parent_has_perm() 469 return verify_new_ex(parent, ex, childcg->behavior); in parent_has_perm() 486 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); in parent_allows_removal() local 488 if (!parent) in parent_allows_removal() 511 if (!parent) in may_allow_all() 513 return parent->behavior == DEVCG_DEFAULT_ALLOW; in may_allow_all() 617 struct dev_cgroup *parent = css_to_devcgroup(devcgroup->css.parent); in devcgroup_update_access() local 634 if (!may_allow_all(parent)) in devcgroup_update_access() 636 if (!parent) { in devcgroup_update_access() [all …]
|
| A D | commoncap.c | 95 if ((ns->parent == cred_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable_helper() 102 ns = ns->parent; in cap_capable_helper() 201 int cap_ptrace_traceme(struct task_struct *parent) in cap_ptrace_traceme() argument 207 cred = __task_cred(parent); in cap_ptrace_traceme() 212 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme() 370 for (ns = current_user_ns();; ns = ns->parent) { in rootid_owns_currentns()
|
| A D | security.c | 1075 int security_ptrace_traceme(struct task_struct *parent) in security_ptrace_traceme() argument 1077 return call_int_hook(ptrace_traceme, parent); in security_ptrace_traceme() 4956 void security_sock_graft(struct sock *sk, struct socket *parent) in security_sock_graft() argument 4958 call_void_hook(sock_graft, sk, parent); in security_sock_graft()
|
| /security/landlock/ |
| A D | ruleset.c | 406 lockdep_assert_held(&parent->lock); in inherit_tree() 409 parent_root = get_root(parent, key_type); in inherit_tree() 435 if (!parent) in inherit_ruleset() 460 flex_array_size(parent, access_masks, parent->num_layers)); in inherit_ruleset() 462 if (WARN_ON_ONCE(!parent->hierarchy)) { in inherit_ruleset() 466 landlock_get_hierarchy(parent->hierarchy); in inherit_ruleset() 467 child->hierarchy->parent = parent->hierarchy; in inherit_ruleset() 470 mutex_unlock(&parent->lock); in inherit_ruleset() 542 if (parent) { in landlock_merge_ruleset() 545 num_layers = parent->num_layers + 1; in landlock_merge_ruleset() [all …]
|
| A D | task.c | 47 if (!parent) in domain_scope_le() 53 for (walker = child->hierarchy; walker; walker = walker->parent) { in domain_scope_le() 54 if (walker == parent->hierarchy) in domain_scope_le() 63 static int domain_ptrace(const struct landlock_ruleset *const parent, in domain_ptrace() argument 66 if (domain_scope_le(parent, child)) in domain_ptrace() 135 static int hook_ptrace_traceme(struct task_struct *const parent) in hook_ptrace_traceme() argument 144 parent_subject = landlock_cred(__task_cred(parent)); in hook_ptrace_traceme() 210 client_walker = client_walker->parent; in domain_is_scoped() 217 server_walker = server_walker->parent; in domain_is_scoped() 229 client_walker = client_walker->parent; in domain_is_scoped() [all …]
|
| A D | domain.h | 80 struct landlock_hierarchy *parent; member 169 hierarchy = hierarchy->parent; in landlock_put_hierarchy()
|
| A D | audit.c | 146 if (WARN_ON_ONCE(!hierarchy->parent)) in get_hierarchy() 149 hierarchy = hierarchy->parent; in get_hierarchy() 163 .parent = &dom0_hierarchy, in test_get_hierarchy() 167 .parent = &dom1_hierarchy, in test_get_hierarchy()
|
| A D | ruleset.h | 208 landlock_merge_ruleset(struct landlock_ruleset *const parent,
|
| /security/tomoyo/ |
| A D | tomoyo.c | 158 static int tomoyo_path_unlink(const struct path *parent, struct dentry *dentry) in tomoyo_path_unlink() argument 160 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_unlink() 174 static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry, in tomoyo_path_mkdir() argument 177 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mkdir() 191 static int tomoyo_path_rmdir(const struct path *parent, struct dentry *dentry) in tomoyo_path_rmdir() argument 193 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_rmdir() 207 static int tomoyo_path_symlink(const struct path *parent, struct dentry *dentry, in tomoyo_path_symlink() argument 210 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_symlink() 225 static int tomoyo_path_mknod(const struct path *parent, struct dentry *dentry, in tomoyo_path_mknod() argument 228 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mknod()
|
| A D | securityfs_if.c | 225 struct dentry *parent, const u8 key) in tomoyo_create_entry() argument 227 securityfs_create_file(name, mode, parent, (void *) (uintptr_t) key, in tomoyo_create_entry()
|
| /security/apparmor/include/ |
| A D | policy_ns.h | 60 struct aa_ns *parent; member 85 const char *aa_ns_name(struct aa_ns *parent, struct aa_ns *child, bool subns); 92 struct aa_ns *__aa_find_or_create_ns(struct aa_ns *parent, const char *name, 99 return rcu_dereference_protected(p->parent, in aa_deref_parent()
|
| A D | policy.h | 236 struct aa_profile __rcu *parent; member 272 struct aa_profile *aa_alloc_null(struct aa_profile *parent, const char *name, 274 struct aa_profile *aa_new_learning_profile(struct aa_profile *parent, bool hat, 277 struct aa_profile *aa_find_child(struct aa_profile *parent, const char *name);
|
| A D | apparmorfs.h | 111 int __aafs_profile_mkdir(struct aa_profile *profile, struct dentry *parent); 113 int __aafs_ns_mkdir(struct aa_ns *ns, struct dentry *parent, const char *name,
|
| /security/keys/ |
| A D | key.c | 53 struct rb_node *parent, **p; in key_user_lookup() local 56 parent = NULL; in key_user_lookup() 62 parent = *p; in key_user_lookup() 63 user = rb_entry(parent, struct key_user, node); in key_user_lookup() 101 rb_link_node(&candidate->node, parent, p); in key_user_lookup() 135 struct rb_node *parent, **p; in key_alloc_serial() local 149 parent = NULL; in key_alloc_serial() 153 parent = *p; in key_alloc_serial() 165 rb_link_node(&key->serial_node, parent, p); in key_alloc_serial() 181 parent = rb_next(parent); in key_alloc_serial() [all …]
|
| A D | keyctl.c | 1628 struct task_struct *me, *parent; in keyctl_session_to_parent() local 1659 parent = rcu_dereference_protected(me->real_parent, in keyctl_session_to_parent() 1663 if (parent->pid <= 1 || !parent->mm) in keyctl_session_to_parent() 1667 if (!thread_group_empty(parent)) in keyctl_session_to_parent() 1673 pcred = __task_cred(parent); in keyctl_session_to_parent() 1697 oldwork = task_work_cancel_func(parent, key_change_session_keyring); in keyctl_session_to_parent() 1701 ret = task_work_add(parent, newwork, TWA_RESUME); in keyctl_session_to_parent()
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm2.c | 102 u32 parent; member 132 options->keyhandle = ctx.parent; in tpm2_key_decode() 150 ctx->parent = 0; in tpm2_key_parent() 152 ctx->parent <<= 8; in tpm2_key_parent() 153 ctx->parent |= v[i]; in tpm2_key_parent()
|
| A D | tpm2key.asn1 | 8 parent INTEGER ({tpm2_key_parent}),
|
| /security/selinux/ss/ |
| A D | sidtab.c | 27 struct sidtab_entry *parent; member 592 rcu_assign_pointer(victim->parent->cache, NULL); in sidtab_sid2str_put() 596 cache->parent = entry; in sidtab_sid2str_put()
|