/security/apparmor/include/ |
H A D | policy_unpack.h | 23 struct aa_profile *old; member in struct:aa_load_ent
|
H A D | resource.h | 43 void __aa_transition_rlimits(struct aa_profile *old, struct aa_profile *new);
|
H A D | apparmorfs.h | 97 void __aa_fs_profile_migrate_dents(struct aa_profile *old,
|
H A D | context.h | 81 const struct aa_task_cxt *old);
|
/security/ |
H A D | commoncap.c | 229 * Determine whether the inheritable capabilities are limited to the old 247 * @old: The current task's current credentials 257 const struct cred *old, 264 cap_combine(old->cap_inheritable, 265 old->cap_permitted))) 270 cap_combine(old->cap_inheritable, 271 old->cap_bset))) 276 if (!cap_issubset(*permitted, old->cap_permitted)) 495 const struct cred *old = current_cred(); local 527 new->cap_permitted = cap_combine(old 256 cap_capset(struct cred *new, const struct cred *old, const kernel_cap_t *effective, const kernel_cap_t *inheritable, const kernel_cap_t *permitted) argument 705 cap_emulate_setxuid(struct cred *new, const struct cred *old) argument 734 cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags) argument 870 const struct cred *old = current_cred(); local [all...] |
H A D | security.c | 188 int security_capset(struct cred *new, const struct cred *old, argument 193 return security_ops->capset(new, old, 848 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp) argument 850 return security_ops->cred_prepare(new, old, gfp); 853 void security_transfer_creds(struct cred *new, const struct cred *old) argument 855 security_ops->cred_transfer(new, old); 894 int security_task_fix_setuid(struct cred *new, const struct cred *old, argument 897 return security_ops->task_fix_setuid(new, old, flags);
|
H A D | capability.c | 405 static int cap_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument 410 static void cap_cred_transfer(struct cred *new, const struct cred *old) argument
|
/security/keys/ |
H A D | process_keys.c | 146 * Install a fresh thread keyring, discarding the old one. 222 struct key *old; local 242 old = cred->session_keyring; 245 if (old) 246 key_put(old); 252 * Install a session keyring, discarding the old one. If a keyring is not 755 const struct cred *old; local 763 old = current_cred(); 786 name, old->uid, old 827 const struct cred *old = current_cred(); local [all...] |
/security/apparmor/ |
H A D | resource.c | 118 * @old: old profile on task (NOT NULL) 121 void __aa_transition_rlimits(struct aa_profile *old, struct aa_profile *new) argument 130 if (old->rlimits.mask) { 132 if (old->rlimits.mask & mask) {
|
H A D | context.c | 23 * If a task uses change_hat it currently does not return to the old 61 * @old: the task context to copy (NOT NULL) 63 void aa_dup_task_context(struct aa_task_cxt *new, const struct aa_task_cxt *old) argument 65 *new = *old;
|
H A D | policy.c | 454 * __remove_profile - remove old profile, and children 965 * __replace_profile - replace @old with @new on a list 966 * @old: profile to be replaced (NOT NULL) 967 * @new: profile to replace @old with (NOT NULL) 968 * @share_replacedby: transfer @old->replacedby to @new 970 * Will duplicate and refcount elements that @new inherits from @old 971 * and will inherit @old children. 973 * refcount @new for list, put @old list refcount 977 static void __replace_profile(struct aa_profile *old, struct aa_profile *new, argument 982 if (!list_empty(&old [all...] |
H A D | file.c | 157 * map_old_perms - map old file perms layout to the new layout 158 * @old: permission set in old mapping 162 static u32 map_old_perms(u32 old) argument 164 u32 new = old & 0xf; 165 if (old & MAY_READ) 167 if (old & MAY_WRITE) 170 if (old & 0x10) 172 /* the old mapping lock and link_subset flags where overlaid 175 if (old [all...] |
H A D | lsm.c | 72 static int apparmor_cred_prepare(struct cred *new, const struct cred *old, argument 80 aa_dup_task_context(cxt, cred_cxt(old)); 88 static void apparmor_cred_transfer(struct cred *new, const struct cred *old) argument 90 const struct aa_task_cxt *old_cxt = cred_cxt(old);
|
H A D | apparmorfs.c | 375 void __aa_fs_profile_migrate_dents(struct aa_profile *old, argument 381 new->dents[i] = old->dents[i]; 382 old->dents[i] = NULL;
|
H A D | policy_unpack.c | 722 aa_put_profile(ent->old);
|
/security/tomoyo/ |
H A D | tomoyo.c | 28 * @old: Pointer to "struct cred". 33 static int tomoyo_cred_prepare(struct cred *new, const struct cred *old, argument 36 struct tomoyo_domain_info *domain = old->security; 47 * @old: Pointer to "struct cred". 49 static void tomoyo_cred_transfer(struct cred *new, const struct cred *old) argument 51 tomoyo_cred_prepare(new, old, 0);
|
/security/selinux/ |
H A D | avc.c | 517 static void avc_node_replace(struct avc_node *new, struct avc_node *old) argument 519 hlist_replace_rcu(&old->list, &new->list); 520 call_rcu(&old->rhead, avc_node_free);
|
H A D | hooks.c | 590 /* check if the old mount command had the same options */ 836 struct superblock_security_struct *old = oldsb->s_security; local 838 char oldflags = old->flags & SE_MNTMASK; 843 if ((oldflags & FSCONTEXT_MNT) && old->sid != new->sid) 845 if ((oldflags & CONTEXT_MNT) && old->mntpoint_sid != new->mntpoint_sid) 847 if ((oldflags & DEFCONTEXT_MNT) && old->def_sid != new->def_sid) 880 /* how can we clone if the old one wasn't set up?? */ 2030 static int selinux_capset(struct cred *new, const struct cred *old, argument 2037 error = cap_capset(new, old, 2042 return cred_has_perm(old, ne 3579 selinux_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument 3598 selinux_cred_transfer(struct cred *new, const struct cred *old) argument [all...] |
/security/smack/ |
H A D | smack_lsm.c | 280 * @ohead - old rules header pointer 930 * @old_dentry: the old object 934 * Read and write access is required on both the old and 1733 * @old: the original credentials 1738 static int smack_cred_prepare(struct cred *new, const struct cred *old, argument 1741 struct task_smack *old_tsp = old->security; 1758 * smack_cred_transfer - Transfer the old credentials to the new credentials 1760 * @old: the original credentials 1764 static void smack_cred_transfer(struct cred *new, const struct cred *old) argument 1766 struct task_smack *old_tsp = old [all...] |