/security/ |
H A D | inode.c | 59 * @parent: a pointer to the parent dentry for this file. This should be a 83 struct dentry *parent, void *data, 102 if (!parent) 103 parent = mount->mnt_root; 105 dir = parent->d_inode; 108 dentry = lookup_one_len(name, parent, strlen(name)); 155 * @parent: a pointer to the parent dentry for this file. This should be a 171 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) argument 82 securityfs_create_file(const char *name, umode_t mode, struct dentry *parent, void *data, const struct file_operations *fops) argument 194 struct dentry *parent; local [all...] |
H A D | device_cgroup.c | 178 * parent's 185 struct dev_cgroup *parent_dev_cgroup = css_to_devcgroup(css->parent); 389 * verify_new_ex - verifies if a new exception is allowed by parent cgroup's permissions 395 * than its parent 418 * parent's exceptions, even slightly 434 * be contained completely in an parent's exception to be 442 /* parent has an exception that matches the proposed */ 453 * must be allowed in the parent device 458 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); local 479 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); local 502 may_allow_all(struct dev_cgroup *parent) argument 610 struct dev_cgroup *parent = css_to_devcgroup(devcgroup->css.parent); local [all...] |
H A D | commoncap.c | 101 /* Have we tried all of the parent namespaces? */ 106 * The owner of the user namespace in the parent of the 109 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) 113 * If you have a capability in a parent user ns, then you have 116 ns = ns->parent; 173 * @parent: The task proposed to be the tracer 175 * If parent is in the same or an ancestor user_ns and has all current's 177 * If parent has the ptrace capability to current's user_ns, then ptrace 184 int cap_ptrace_traceme(struct task_struct *parent) argument 190 cred = __task_cred(parent); [all...] |
H A D | security.c | 169 int security_ptrace_traceme(struct task_struct *parent) argument 173 rc = yama_ptrace_traceme(parent); 177 return security_ops->ptrace_traceme(parent); 1281 void security_sock_graft(struct sock *sk, struct socket *parent) argument 1283 security_ops->sock_graft(sk, parent);
|
H A D | capability.c | 711 static void cap_sock_graft(struct sock *sk, struct socket *parent) argument
|
/security/yama/ |
H A D | yama_lsm.c | 209 * @parent: the process to compare against while walking up from child 210 * @child: the process to start from while looking upwards for parent 212 * Returns 1 if child is a descendant of parent, 0 if not. 214 static int task_is_descendant(struct task_struct *parent, argument 220 if (!parent || !child) 224 if (!thread_group_leader(parent)) 225 parent = rcu_dereference(parent->group_leader); 229 if (walker == parent) { 252 struct task_struct *parent local 336 yama_ptrace_traceme(struct task_struct *parent) argument [all...] |
/security/tomoyo/ |
H A D | tomoyo.c | 168 * @parent: Pointer to "struct path". 173 static int tomoyo_path_unlink(struct path *parent, struct dentry *dentry) argument 175 struct path path = { parent->mnt, dentry }; 182 * @parent: Pointer to "struct path". 188 static int tomoyo_path_mkdir(struct path *parent, struct dentry *dentry, argument 191 struct path path = { parent->mnt, dentry }; 199 * @parent: Pointer to "struct path". 204 static int tomoyo_path_rmdir(struct path *parent, struct dentry *dentry) argument 206 struct path path = { parent->mnt, dentry }; 213 * @parent 219 tomoyo_path_symlink(struct path *parent, struct dentry *dentry, const char *old_name) argument 236 tomoyo_path_mknod(struct path *parent, struct dentry *dentry, umode_t mode, unsigned int dev) argument [all...] |
H A D | securityfs_if.c | 222 * @parent: The parent directory. 228 struct dentry *parent, const u8 key) 230 securityfs_create_file(name, mode, parent, ((u8 *) NULL) + key, 227 tomoyo_create_entry(const char *name, const umode_t mode, struct dentry *parent, const u8 key) argument
|
/security/apparmor/ |
H A D | policy.c | 41 * name before the // being the parent and the name after the child. 225 * @curr: namespace to treat as the parent (NOT NULL) 235 for ( ; view; view = view->parent) { 236 if (view->parent == curr) 269 * @prefix: parent namespace name (MAYBE NULL) 325 aa_put_namespace(ns->parent); 404 ns->parent = aa_get_namespace(root); 500 if (ns->parent) 501 __aa_update_replacedby(ns->unconfined, ns->parent->unconfined); 510 * Requires: ns->parent 688 aa_new_null_profile(struct aa_profile *parent, int hat) argument 764 aa_find_child(struct aa_profile *parent, const char *name) argument 1008 struct aa_profile *parent = aa_deref_parent(old); local 1145 struct dentry *parent; local 1183 struct aa_profile *parent, *newest; local [all...] |
H A D | apparmorfs.c | 401 int __aa_fs_profile_mkdir(struct aa_profile *profile, struct dentry *parent) argument 407 if (!parent) { 411 /* adding to parent that previously didn't have children */ 415 prof_child_dir(p) = parent = dent; 431 dent = securityfs_create_dir(profile->dirname, parent); 501 int __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent, argument 512 dent = securityfs_create_dir(name, parent); 566 * Requires: ns->parent->lock to be held 572 struct aa_namespace *parent, *next; local 581 /* check if the next ns is a sibling, parent, g 627 struct aa_profile *parent; local 834 aafs_create_file(struct aa_fs_entry *fs_file, struct dentry *parent) argument 858 aafs_create_dir(struct aa_fs_entry *fs_dir, struct dentry *parent) argument [all...] |
H A D | lsm.c | 106 static int apparmor_ptrace_traceme(struct task_struct *parent) argument 108 int error = cap_ptrace_traceme(parent); 112 return aa_ptrace(parent, current, PTRACE_MODE_ATTACH);
|
H A D | domain.c | 643 root = aa_get_profile_rcu(&profile->parent);
|
/security/integrity/ |
H A D | iint.c | 95 struct rb_node *node, *parent = NULL; local 110 parent = *p; 111 test_iint = rb_entry(parent, struct integrity_iint_cache, 122 rb_link_node(node, parent, p);
|
/security/apparmor/include/ |
H A D | apparmorfs.h | 99 int __aa_fs_profile_mkdir(struct aa_profile *profile, struct dentry *parent); 101 int __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent,
|
H A D | policy.h | 107 * @parent: parent of namespace 132 struct aa_namespace *parent; member in struct:aa_namespace 164 * @parent: parent of profile 192 * a reference to their parent. 202 struct aa_profile __rcu *parent; member in struct:aa_profile 233 const char *aa_ns_name(struct aa_namespace *parent, struct aa_namespace *child); 244 struct aa_profile *aa_new_null_profile(struct aa_profile *parent, int hat); 247 struct aa_profile *aa_find_child(struct aa_profile *parent, cons [all...] |
/security/keys/ |
H A D | key.c | 57 struct rb_node *parent = NULL; local 66 parent = *p; 67 user = rb_entry(parent, struct key_user, node); 105 rb_link_node(&candidate->node, parent, p); 139 struct rb_node *parent, **p; local 153 parent = NULL; 157 parent = *p; 158 xkey = rb_entry(parent, struct key, serial_node); 169 rb_link_node(&key->serial_node, parent, p); 185 parent [all...] |
H A D | keyctl.c | 1479 * parent process. 1482 * parent process must be single-threaded and must have the same effective 1485 * The keyring will be emplaced on the parent when it next resumes userspace. 1491 struct task_struct *me, *parent; local 1504 /* our parent is going to need a new cred struct, a new tgcred struct 1506 * our parent */ 1522 parent = me->real_parent; 1524 /* the parent mustn't be init and mustn't be a kernel thread */ 1525 if (parent->pid <= 1 || !parent [all...] |
/security/selinux/ |
H A D | hooks.c | 874 * if the parent was able to be mounted it clearly had no special lsm 1472 /* Commonly granted from child to parent. */ 2007 static int selinux_ptrace_traceme(struct task_struct *parent) argument 2011 rc = cap_ptrace_traceme(parent); 2015 return task_has_perm(parent, current, PROCESS__PTRACE); 2395 /* Always clear parent death signal on SID transitions. */ 2461 /* Wake up the parent if it is waiting so that it can recheck 4018 * @sk_sid: the parent socket's SID 4631 static void selinux_sock_graft(struct sock *sk, struct socket *parent) argument 4633 struct inode_security_struct *isec = SOCK_INODE(parent) [all...] |
/security/smack/ |
H A D | smack_lsm.c | 406 * @ptp: parent task pointer 2025 * get marked with SMACK64EXEC and even if the parent 2026 * and child shouldn't be talking the parent still 3624 * Sets the netlabel socket state on sk from parent 3672 * @parent: parent socket 3677 static void smack_sock_graft(struct sock *sk, struct socket *parent) argument
|