Home
last modified time | relevance | path

Searched refs:target (Results 1 – 22 of 22) sorted by relevance

/security/yama/
A Dyama_lsm.c48 struct task_struct *target; member
58 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access()
63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
70 put_task_struct(info->target); in __report_access()
75 static void report_access(const char *access, struct task_struct *target, in report_access() argument
80 assert_spin_locked(&target->alloc_lock); /* for target->comm */ in report_access()
88 access, target->comm, target->pid, agent->comm, agent->pid); in report_access()
96 get_task_struct(target); in report_access()
99 info->target = target; in report_access()
105 put_task_struct(target); in report_access()
/security/apparmor/
A Ddomain.c782 target, new, in profile_transition()
1297 target = new; in aa_change_hat()
1319 target = previous; in aa_change_hat()
1462 if (IS_ERR(target)) { in aa_change_profile()
1466 error = PTR_ERR(target); in aa_change_profile()
1467 target = NULL; in aa_change_profile()
1483 target = &tprofile->label; in aa_change_profile()
1498 profile, target, stack, in aa_change_profile()
1526 aa_get_label(target), in aa_change_profile()
1571 NULL, new ? new : target, in aa_change_profile()
[all …]
A Dfile.c73 } else if (ad->fs.target) { in file_audit_cb()
75 audit_log_untrustedstring(ab, ad->fs.target); in file_audit_cb()
98 const char *target, struct aa_label *tlabel, in aa_audit_file() argument
107 ad.fs.target = target; in aa_audit_file()
310 static inline bool xindex_is_subset(u32 link, u32 target) in xindex_is_subset() argument
312 if (((link & ~AA_X_UNSAFE) != (target & ~AA_X_UNSAFE)) || in xindex_is_subset()
313 ((link & AA_X_UNSAFE) && !(target & AA_X_UNSAFE))) in xindex_is_subset()
322 const struct path *target, char *buffer2, in profile_path_link() argument
340 error = path_name(OP_LINK, subj_cred, &profile->label, target, in profile_path_link()
432 vfsuid_t vfsuid = i_uid_into_vfsuid(mnt_idmap(target.mnt), inode); in aa_path_link()
[all …]
A Dipc.c103 const struct cred *target_cred, struct aa_label *target, in aa_may_signal() argument
111 return xcheck_labels(sender, target, profile, in aa_may_signal()
112 profile_signal_perm(subj_cred, profile, target, in aa_may_signal()
A Dmount.c721 struct aa_label *target = NULL; in aa_pivotroot() local
734 target = fn_label_build(label, profile, GFP_KERNEL, in aa_pivotroot()
738 if (!target) { in aa_pivotroot()
742 } else if (!IS_ERR(target)) { in aa_pivotroot()
743 error = aa_replace_current_label(target); in aa_pivotroot()
746 aa_put_label(target); in aa_pivotroot()
749 aa_put_label(target); in aa_pivotroot()
752 error = PTR_ERR(target); in aa_pivotroot()
A Dapparmorfs.c108 static int mangle_name(const char *name, char *target) in mangle_name() argument
110 char *t = target; in mangle_name()
115 if (target) { in mangle_name()
137 return t - target; in mangle_name()
1634 char *target; in rawdata_get_link_base() local
1643 target = gen_symlink_name(depth, profile->rawdata->name, name); in rawdata_get_link_base()
1646 if (IS_ERR(target)) in rawdata_get_link_base()
1647 return target; in rawdata_get_link_base()
1649 set_delayed_call(done, kfree_link, target); in rawdata_get_link_base()
1651 return target; in rawdata_get_link_base()
A Dlsm.c163 static int apparmor_capget(const struct task_struct *target, kernel_cap_t *effective, in apparmor_capget() argument
170 cred = __task_cred(target); in apparmor_capget()
619 if (ad->uring.target) { in audit_uring_cb()
622 ad->uring.target, in audit_uring_cb()
672 ad.uring.target = cred_label(new); in apparmor_uring_override_creds()
1027 static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo *info, in apparmor_task_kill() argument
1035 tc = get_task_cred(target); in apparmor_task_kill()
/security/selinux/ss/
A Dsidtab.c323 struct sidtab *target = convert->target; in sidtab_context_to_sid() local
326 dst_convert = sidtab_do_lookup(target, count, 1); in sidtab_context_to_sid()
341 target->count = count + 1; in sidtab_context_to_sid()
343 hash_add_rcu(target->context_to_sid, &dst_convert->list, in sidtab_context_to_sid()
446 rc = sidtab_do_lookup(params->target, count - 1, 1) ? 0 : -ENOMEM; in sidtab_convert()
453 params->target->count = count; in sidtab_convert()
465 rc = sidtab_convert_tree(&params->target->roots[level], in sidtab_convert()
479 sidtab_convert_hashtable(params->target, count); in sidtab_convert()
A Dsidtab.h71 struct sidtab *target; member
A Dservices.c543 struct type_datum *target; in type_attribute_bounds_av() local
552 target = policydb->type_val_to_struct[tcontext->type - 1]; in type_attribute_bounds_av()
553 BUG_ON(!target); in type_attribute_bounds_av()
560 if (target->bounds) { in type_attribute_bounds_av()
562 lo_tcontext.type = target->bounds; in type_attribute_bounds_av()
2373 convert_data->sidtab_params.target = newpolicy->sidtab; in security_load_policy()
/security/keys/
A Drequest_key_auth.c161 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument
171 kenter("%d,", target->serial); in request_key_auth_new()
210 rka->target_key = key_get(target); in request_key_auth_new()
214 sprintf(desc, "%x", target->serial); in request_key_auth_new()
A Dinternal.h206 extern struct key *request_key_auth_new(struct key *target,
/security/
A Dinode.c264 const char *target, in securityfs_create_symlink() argument
270 if (target) { in securityfs_create_symlink()
271 link = kstrdup(target, GFP_KERNEL); in securityfs_create_symlink()
A Dcommoncap.c230 int cap_capget(const struct task_struct *target, kernel_cap_t *effective, in cap_capget() argument
237 cred = __task_cred(target); in cap_capget()
852 #define __cap_gained(field, target, source) \ argument
853 !cap_issubset(target->cap_##field, source->cap_##field)
854 #define __cap_grew(target, source, cred) \ argument
855 !cap_issubset(cred->cap_##target, cred->cap_##source)
A Dsecurity.c1094 int security_capget(const struct task_struct *target, in security_capget() argument
1099 return call_int_hook(capget, target, effective, inheritable, permitted); in security_capget()
3926 struct task_struct *target, long type, int mode) in security_msg_queue_msgrcv() argument
3928 return call_int_hook(msg_queue_msgrcv, msq, msg, target, type, mode); in security_msg_queue_msgrcv()
/security/apparmor/include/
A Daudit.h128 const char *target; member
163 struct aa_label *target; member
A Dipc.h20 const struct cred *target_cred, struct aa_label *target,
A Dfile.h77 const char *target, struct aa_label *tlabel, kuid_t ouid,
/security/tomoyo/
A Dfile.c803 int tomoyo_path_perm(const u8 operation, const struct path *path, const char *target) in tomoyo_path_perm() argument
831 symlink_target.name = tomoyo_encode(target); in tomoyo_path_perm()
A Dcommon.h992 const char *target);
/security/selinux/
A Dhooks.c2126 static int selinux_capget(const struct task_struct *target, kernel_cap_t *effective, in selinux_capget() argument
2129 return avc_has_perm(current_sid(), task_sid_obj(target), in selinux_capget()
6303 struct task_struct *target, in selinux_msg_queue_msgrcv() argument
6309 u32 sid = task_sid_obj(target); in selinux_msg_queue_msgrcv()
/security/smack/
A Dsmack_lsm.c3408 struct task_struct *target, long type, in smack_msg_queue_msgrcv() argument

Completed in 657 milliseconds