Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 9 of 9) sorted by relevance

/security/landlock/
A Dtask.c275 if (!subject) in hook_unix_stream_connect()
281 if (!sock_is_scoped(other, subject->domain)) in hook_unix_stream_connect()
305 if (!subject) in hook_unix_may_send()
318 if (!sock_is_scoped(other->sk, subject->domain)) in hook_unix_may_send()
344 const struct landlock_cred_security *subject; in hook_task_kill() local
366 if (!subject) in hook_task_kill()
371 is_scoped = domain_is_scoped(subject->domain, in hook_task_kill()
393 const struct landlock_cred_security *subject; in hook_file_send_sigiotask() local
398 subject = &landlock_file(fown->file)->fown_subject; in hook_file_send_sigiotask()
407 if (!subject->domain) in hook_file_send_sigiotask()
[all …]
A Dfs.c963 if (!subject) in current_check_access_path()
974 landlock_log_denial(subject, &request); in current_check_access_path()
1145 if (!subject) in current_check_refer_path()
1172 subject->domain, in current_check_refer_path()
1431 if (!subject) in hook_sb_mount()
1446 if (!subject) in hook_move_mount()
1464 if (!subject) in hook_sb_umount()
1478 if (!subject) in hook_sb_remount()
1501 if (!subject) in hook_sb_pivotroot()
1625 if (!subject) in hook_file_open()
[all …]
A Dnet.c58 const struct landlock_cred_security *const subject = in current_check_access_socket() local
62 if (!subject) in current_check_access_socket()
177 rule = landlock_find_rule(subject->domain, id); in current_check_access_socket()
178 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_socket()
186 landlock_log_denial(subject, in current_check_access_socket()
A Daudit.c390 void landlock_log_denial(const struct landlock_cred_security *const subject, in landlock_log_denial() argument
398 if (WARN_ON_ONCE(!subject || !subject->domain || in landlock_log_denial()
399 !subject->domain->hierarchy || !request)) in landlock_log_denial()
410 subject->domain, &missing, request->layer_masks, in landlock_log_denial()
418 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial()
422 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial()
440 if (subject->domain_exec & BIT(youngest_layer)) { in landlock_log_denial()
A Daudit.h58 void landlock_log_denial(const struct landlock_cred_security *const subject,
69 landlock_log_denial(const struct landlock_cred_security *const subject, in landlock_log_denial() argument
/security/smack/
A Dsmack_access.c117 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument
129 if (subject == &smack_known_star) { in smk_access()
138 if (object == &smack_known_web || subject == &smack_known_web) in smk_access()
149 if (subject->smk_known == object->smk_known) in smk_access()
159 if (subject == &smack_known_hat) in smk_access()
170 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access()
171 &subject->smk_rules); in smk_access()
194 if (subject == smack_unconfined) in smk_access()
201 smack_log(subject->smk_known, object->smk_known, in smk_access()
327 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback()
[all …]
A Dsmack.h261 char *subject; member
A Dsmackfs.c315 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument
324 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule()
332 cp = smk_parse_smack(subject, len); in smk_fill_rule()
A Dsmack_lsm.c2677 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument
2696 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check()
2697 rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc); in smk_ipv6_check()

Completed in 677 milliseconds