Home
last modified time | relevance | path

Searched refs:security (Results 1 – 22 of 22) sorted by relevance

/security/integrity/evm/
DKconfig9 EVM protects a file's security extended attributes against
35 In addition to the original security xattrs (eg. security.selinux,
36 security.SMACK64, security.capability, and security.ima) included
38 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and
39 security.SMACK64MMAP.
/security/selinux/
Dxfrm.c70 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
181 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
182 if (x->security) in selinux_xfrm_state_pol_flow_match()
189 if (!x->security) in selinux_xfrm_state_pol_flow_match()
197 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match()
221 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress()
236 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_skb_sid_ingress()
334 return selinux_xfrm_alloc_user(&x->security, uctx, GFP_KERNEL); in selinux_xfrm_state_alloc()
371 x->security = ctx; in selinux_xfrm_state_alloc_acquire()
383 selinux_xfrm_free(x->security); in selinux_xfrm_state_free()
[all …]
Dhooks.c200 cred->security = tsec; in cred_init_security()
210 tsec = cred->security; in cred_sid()
446 const struct task_security_struct *tsec = cred->security; in may_context_mount_sb_relabel()
463 const struct task_security_struct *tsec = cred->security; in may_context_mount_inode_relabel()
2425 new_tsec = bprm->cred->security; in selinux_bprm_set_creds()
2583 new_tsec = bprm->cred->security; in selinux_bprm_committing_creds()
2944 rc = selinux_determine_inode_label(old->security, in selinux_dentry_create_files_as()
2951 tsec = new->security; in selinux_dentry_create_files_as()
3432 tsec = new_creds->security; in selinux_inode_copy_up()
3835 cred->security = tsec; in selinux_cred_alloc_blank()
[all …]
DMakefile17 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
DKconfig55 kernel hardening feature for security hooks. Please consider
/security/
DKconfig7 source security/keys/Kconfig
31 bool "Enable different security models"
35 This allows you to choose different security modules to be
38 If this option is not selected, the default Linux security
61 This enables the socket and networking security hooks.
62 If enabled, a security module can use these hooks to
81 This enables the Infiniband security hooks.
82 If enabled, a security module can use these hooks to
90 This enables the XFRM (IPSec) networking security hooks.
91 If enabled, a security module can use these hooks to
[all …]
Dsecurity.c1002 if (unlikely(cred->security == NULL)) in security_cred_free()
1505 int security_tun_dev_alloc_security(void **security) in security_tun_dev_alloc_security() argument
1507 return call_int_hook(tun_dev_alloc_security, 0, security); in security_tun_dev_alloc_security()
1511 void security_tun_dev_free_security(void *security) in security_tun_dev_free_security() argument
1513 call_void_hook(tun_dev_free_security, security); in security_tun_dev_free_security()
1523 int security_tun_dev_attach_queue(void *security) in security_tun_dev_attach_queue() argument
1525 return call_int_hook(tun_dev_attach_queue, 0, security); in security_tun_dev_attach_queue()
1529 int security_tun_dev_attach(struct sock *sk, void *security) in security_tun_dev_attach() argument
1531 return call_int_hook(tun_dev_attach, 0, sk, security); in security_tun_dev_attach()
1535 int security_tun_dev_open(void *security) in security_tun_dev_open() argument
[all …]
DMakefile19 obj-$(CONFIG_SECURITY) += security.o
/security/tomoyo/
Dtomoyo.c21 new->security = NULL; in tomoyo_cred_alloc_blank()
37 struct tomoyo_domain_info *domain = old->security; in tomoyo_cred_prepare()
38 new->security = domain; in tomoyo_cred_prepare()
62 struct tomoyo_domain_info *domain = cred->security; in tomoyo_cred_free()
97 bprm->cred->security)->users); in tomoyo_bprm_set_creds()
102 bprm->cred->security = NULL; in tomoyo_bprm_set_creds()
115 struct tomoyo_domain_info *domain = bprm->cred->security; in tomoyo_bprm_check_security()
548 cred->security = &tomoyo_kernel_domain; in tomoyo_init()
Dsecurityfs_if.c75 cred->security; in tomoyo_write_self()
76 cred->security = new_domain; in tomoyo_write_self()
240 if (current_cred()->security != &tomoyo_kernel_domain) in tomoyo_initerface_init()
DKconfig38 You can read the log via /sys/kernel/security/tomoyo/audit.
Dcommon.h1206 return current_cred()->security; in tomoyo_domain()
1219 return task_cred_xxx(task, security); in tomoyo_real_domain()
Ddomain.c846 bprm->cred->security = domain; in tomoyo_find_next_domain()
/security/yama/
DKconfig7 system-wide security settings beyond regular Linux discretionary
9 Like capabilities, this security module stacks with other LSMs.
/security/smack/
Dsmack_lsm.c227 struct task_smack *tsp = cred->security; in smk_bu_credfile()
431 tsp = __task_cred(tracer)->security; in smk_ptrace_rule_check()
915 struct task_smack *bsp = bprm->cred->security; in smack_bprm_set_creds()
1843 struct smack_known *tkp = smk_of_task(tsk->cred->security); in smack_file_send_sigiotask()
1933 struct task_smack *tsp = cred->security; in smack_file_open()
1967 cred->security = tsp; in smack_cred_alloc_blank()
1980 struct task_smack *tsp = cred->security; in smack_cred_free()
1987 cred->security = NULL; in smack_cred_free()
2010 struct task_smack *old_tsp = old->security; in smack_cred_prepare()
2018 new->security = new_tsp; in smack_cred_prepare()
[all …]
DKconfig12 of other mandatory security schemes.
40 This enables security marking of network packets using
Dsmack.h389 skp = smk_of_task(__task_cred(t)->security); in smk_of_task_struct()
/security/integrity/
DKconfig69 source security/integrity/ima/Kconfig
70 source security/integrity/evm/Kconfig
/security/loadpin/
DKconfig6 (kernel modules, firmware, kexec images, security policy)
/security/apparmor/include/
Dcontext.h25 #define cred_ctx(X) ((X)->security)
/security/apparmor/
DKconfig10 This enables the AppArmor security module.
/security/integrity/ima/
DKconfig150 It requires the system to be labeled with a security extended
152 the security extended attributes from offline attack, enable