Searched refs:subject (Results 1 – 9 of 9) sorted by relevance
| /security/landlock/ |
| A D | task.c | 275 if (!subject) in hook_unix_stream_connect() 281 if (!sock_is_scoped(other, subject->domain)) in hook_unix_stream_connect() 305 if (!subject) in hook_unix_may_send() 318 if (!sock_is_scoped(other->sk, subject->domain)) in hook_unix_may_send() 344 const struct landlock_cred_security *subject; in hook_task_kill() local 366 if (!subject) in hook_task_kill() 371 is_scoped = domain_is_scoped(subject->domain, in hook_task_kill() 393 const struct landlock_cred_security *subject; in hook_file_send_sigiotask() local 398 subject = &landlock_file(fown->file)->fown_subject; in hook_file_send_sigiotask() 407 if (!subject->domain) in hook_file_send_sigiotask() [all …]
|
| A D | fs.c | 963 if (!subject) in current_check_access_path() 974 landlock_log_denial(subject, &request); in current_check_access_path() 1145 if (!subject) in current_check_refer_path() 1172 subject->domain, in current_check_refer_path() 1431 if (!subject) in hook_sb_mount() 1446 if (!subject) in hook_move_mount() 1464 if (!subject) in hook_sb_umount() 1478 if (!subject) in hook_sb_remount() 1501 if (!subject) in hook_sb_pivotroot() 1625 if (!subject) in hook_file_open() [all …]
|
| A D | net.c | 58 const struct landlock_cred_security *const subject = in current_check_access_socket() local 62 if (!subject) in current_check_access_socket() 177 rule = landlock_find_rule(subject->domain, id); in current_check_access_socket() 178 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_socket() 186 landlock_log_denial(subject, in current_check_access_socket()
|
| A D | audit.c | 390 void landlock_log_denial(const struct landlock_cred_security *const subject, in landlock_log_denial() argument 398 if (WARN_ON_ONCE(!subject || !subject->domain || in landlock_log_denial() 399 !subject->domain->hierarchy || !request)) in landlock_log_denial() 410 subject->domain, &missing, request->layer_masks, in landlock_log_denial() 418 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial() 422 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial() 440 if (subject->domain_exec & BIT(youngest_layer)) { in landlock_log_denial()
|
| A D | audit.h | 58 void landlock_log_denial(const struct landlock_cred_security *const subject, 69 landlock_log_denial(const struct landlock_cred_security *const subject, in landlock_log_denial() argument
|
| /security/smack/ |
| A D | smack_access.c | 117 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 129 if (subject == &smack_known_star) { in smk_access() 138 if (object == &smack_known_web || subject == &smack_known_web) in smk_access() 149 if (subject->smk_known == object->smk_known) in smk_access() 159 if (subject == &smack_known_hat) in smk_access() 170 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access() 171 &subject->smk_rules); in smk_access() 194 if (subject == smack_unconfined) in smk_access() 201 smack_log(subject->smk_known, object->smk_known, in smk_access() 327 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback() [all …]
|
| A D | smack.h | 261 char *subject; member
|
| A D | smackfs.c | 315 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument 324 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule() 332 cp = smk_parse_smack(subject, len); in smk_fill_rule()
|
| A D | smack_lsm.c | 2677 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument 2696 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check() 2697 rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc); in smk_ipv6_check()
|
Completed in 677 milliseconds