| /security/yama/ |
| A D | yama_lsm.c | 48 struct task_struct *target; member 58 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access() 63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 70 put_task_struct(info->target); in __report_access() 75 static void report_access(const char *access, struct task_struct *target, in report_access() argument 80 assert_spin_locked(&target->alloc_lock); /* for target->comm */ in report_access() 88 access, target->comm, target->pid, agent->comm, agent->pid); in report_access() 96 get_task_struct(target); in report_access() 99 info->target = target; in report_access() 105 put_task_struct(target); in report_access()
|
| /security/apparmor/ |
| A D | domain.c | 782 target, new, in profile_transition() 1297 target = new; in aa_change_hat() 1319 target = previous; in aa_change_hat() 1462 if (IS_ERR(target)) { in aa_change_profile() 1466 error = PTR_ERR(target); in aa_change_profile() 1467 target = NULL; in aa_change_profile() 1483 target = &tprofile->label; in aa_change_profile() 1498 profile, target, stack, in aa_change_profile() 1526 aa_get_label(target), in aa_change_profile() 1571 NULL, new ? new : target, in aa_change_profile() [all …]
|
| A D | file.c | 73 } else if (ad->fs.target) { in file_audit_cb() 75 audit_log_untrustedstring(ab, ad->fs.target); in file_audit_cb() 98 const char *target, struct aa_label *tlabel, in aa_audit_file() argument 107 ad.fs.target = target; in aa_audit_file() 310 static inline bool xindex_is_subset(u32 link, u32 target) in xindex_is_subset() argument 312 if (((link & ~AA_X_UNSAFE) != (target & ~AA_X_UNSAFE)) || in xindex_is_subset() 313 ((link & AA_X_UNSAFE) && !(target & AA_X_UNSAFE))) in xindex_is_subset() 322 const struct path *target, char *buffer2, in profile_path_link() argument 340 error = path_name(OP_LINK, subj_cred, &profile->label, target, in profile_path_link() 432 vfsuid_t vfsuid = i_uid_into_vfsuid(mnt_idmap(target.mnt), inode); in aa_path_link() [all …]
|
| A D | ipc.c | 103 const struct cred *target_cred, struct aa_label *target, in aa_may_signal() argument 111 return xcheck_labels(sender, target, profile, in aa_may_signal() 112 profile_signal_perm(subj_cred, profile, target, in aa_may_signal()
|
| A D | mount.c | 721 struct aa_label *target = NULL; in aa_pivotroot() local 734 target = fn_label_build(label, profile, GFP_KERNEL, in aa_pivotroot() 738 if (!target) { in aa_pivotroot() 742 } else if (!IS_ERR(target)) { in aa_pivotroot() 743 error = aa_replace_current_label(target); in aa_pivotroot() 746 aa_put_label(target); in aa_pivotroot() 749 aa_put_label(target); in aa_pivotroot() 752 error = PTR_ERR(target); in aa_pivotroot()
|
| A D | apparmorfs.c | 108 static int mangle_name(const char *name, char *target) in mangle_name() argument 110 char *t = target; in mangle_name() 115 if (target) { in mangle_name() 137 return t - target; in mangle_name() 1634 char *target; in rawdata_get_link_base() local 1643 target = gen_symlink_name(depth, profile->rawdata->name, name); in rawdata_get_link_base() 1646 if (IS_ERR(target)) in rawdata_get_link_base() 1647 return target; in rawdata_get_link_base() 1649 set_delayed_call(done, kfree_link, target); in rawdata_get_link_base() 1651 return target; in rawdata_get_link_base()
|
| A D | lsm.c | 163 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() argument 170 cred = __task_cred(target); in apparmor_capget() 619 if (ad->uring.target) { in audit_uring_cb() 622 ad->uring.target, in audit_uring_cb() 672 ad.uring.target = cred_label(new); in apparmor_uring_override_creds() 1027 static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo *info, in apparmor_task_kill() argument 1035 tc = get_task_cred(target); in apparmor_task_kill()
|
| /security/selinux/ss/ |
| A D | sidtab.c | 323 struct sidtab *target = convert->target; in sidtab_context_to_sid() local 326 dst_convert = sidtab_do_lookup(target, count, 1); in sidtab_context_to_sid() 341 target->count = count + 1; in sidtab_context_to_sid() 343 hash_add_rcu(target->context_to_sid, &dst_convert->list, in sidtab_context_to_sid() 446 rc = sidtab_do_lookup(params->target, count - 1, 1) ? 0 : -ENOMEM; in sidtab_convert() 453 params->target->count = count; in sidtab_convert() 465 rc = sidtab_convert_tree(¶ms->target->roots[level], in sidtab_convert() 479 sidtab_convert_hashtable(params->target, count); in sidtab_convert()
|
| A D | sidtab.h | 71 struct sidtab *target; member
|
| A D | services.c | 543 struct type_datum *target; in type_attribute_bounds_av() local 552 target = policydb->type_val_to_struct[tcontext->type - 1]; in type_attribute_bounds_av() 553 BUG_ON(!target); in type_attribute_bounds_av() 560 if (target->bounds) { in type_attribute_bounds_av() 562 lo_tcontext.type = target->bounds; in type_attribute_bounds_av() 2373 convert_data->sidtab_params.target = newpolicy->sidtab; in security_load_policy()
|
| /security/keys/ |
| A D | request_key_auth.c | 161 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument 171 kenter("%d,", target->serial); in request_key_auth_new() 210 rka->target_key = key_get(target); in request_key_auth_new() 214 sprintf(desc, "%x", target->serial); in request_key_auth_new()
|
| A D | internal.h | 206 extern struct key *request_key_auth_new(struct key *target,
|
| /security/ |
| A D | inode.c | 264 const char *target, in securityfs_create_symlink() argument 270 if (target) { in securityfs_create_symlink() 271 link = kstrdup(target, GFP_KERNEL); in securityfs_create_symlink()
|
| A D | commoncap.c | 230 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument 237 cred = __task_cred(target); in cap_capget() 852 #define __cap_gained(field, target, source) \ argument 853 !cap_issubset(target->cap_##field, source->cap_##field) 854 #define __cap_grew(target, source, cred) \ argument 855 !cap_issubset(cred->cap_##target, cred->cap_##source)
|
| A D | security.c | 1094 int security_capget(const struct task_struct *target, in security_capget() argument 1099 return call_int_hook(capget, target, effective, inheritable, permitted); in security_capget() 3926 struct task_struct *target, long type, int mode) in security_msg_queue_msgrcv() argument 3928 return call_int_hook(msg_queue_msgrcv, msq, msg, target, type, mode); in security_msg_queue_msgrcv()
|
| /security/apparmor/include/ |
| A D | audit.h | 128 const char *target; member 163 struct aa_label *target; member
|
| A D | ipc.h | 20 const struct cred *target_cred, struct aa_label *target,
|
| A D | file.h | 77 const char *target, struct aa_label *tlabel, kuid_t ouid,
|
| /security/tomoyo/ |
| A D | file.c | 803 int tomoyo_path_perm(const u8 operation, const struct path *path, const char *target) in tomoyo_path_perm() argument 831 symlink_target.name = tomoyo_encode(target); in tomoyo_path_perm()
|
| A D | common.h | 992 const char *target);
|
| /security/selinux/ |
| A D | hooks.c | 2126 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective, in selinux_capget() argument 2129 return avc_has_perm(current_sid(), task_sid_obj(target), in selinux_capget() 6303 struct task_struct *target, in selinux_msg_queue_msgrcv() argument 6309 u32 sid = task_sid_obj(target); in selinux_msg_queue_msgrcv()
|
| /security/smack/ |
| A D | smack_lsm.c | 3408 struct task_struct *target, long type, in smack_msg_queue_msgrcv() argument
|