Home
last modified time | relevance | path

Searched refs:parent (Results 1 – 21 of 21) sorted by relevance

/security/apparmor/
Dpolicy_ns.c45 for ( ; view; view = view->parent) { in aa_ns_visible()
46 if (view->parent == curr) in aa_ns_visible()
144 aa_put_ns(ns->parent); in aa_free_ns()
242 static struct aa_ns *__aa_create_ns(struct aa_ns *parent, const char *name, in __aa_create_ns() argument
248 AA_BUG(!parent); in __aa_create_ns()
250 AA_BUG(!mutex_is_locked(&parent->lock)); in __aa_create_ns()
252 ns = alloc_ns(parent->base.hname, name); in __aa_create_ns()
255 ns->level = parent->level + 1; in __aa_create_ns()
257 error = __aafs_ns_mkdir(ns, ns_subns_dir(parent), name, dir); in __aa_create_ns()
265 ns->parent = aa_get_ns(parent); in __aa_create_ns()
[all …]
Dpolicy.c217 aa_put_profile(rcu_access_pointer(profile->parent)); in aa_free_profile()
333 struct aa_profile *aa_find_child(struct aa_profile *parent, const char *name) in aa_find_child() argument
339 profile = __find_child(&parent->base.profiles, name); in aa_find_child()
502 struct aa_profile *aa_new_null_profile(struct aa_profile *parent, bool hat, in aa_new_null_profile() argument
509 AA_BUG(!parent); in aa_new_null_profile()
512 name = kmalloc(strlen(parent->base.hname) + 8 + strlen(base), in aa_new_null_profile()
515 sprintf(name, "%s//null-%s", parent->base.hname, base); in aa_new_null_profile()
521 name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, gfp); in aa_new_null_profile()
524 sprintf(name, "%s//null-%x", parent->base.hname, in aa_new_null_profile()
525 atomic_inc_return(&parent->ns->uniq_null)); in aa_new_null_profile()
[all …]
Dapparmorfs.c232 struct dentry *parent, void *data, void *link, in aafs_create() argument
241 AA_BUG(!parent); in aafs_create()
250 dir = d_inode(parent); in aafs_create()
253 dentry = lookup_one_len(name, parent, strlen(name)); in aafs_create()
293 struct dentry *parent, void *data, in aafs_create_file() argument
296 return aafs_create(name, mode, parent, data, NULL, fops, NULL); in aafs_create_file()
307 static struct dentry *aafs_create_dir(const char *name, struct dentry *parent) in aafs_create_dir() argument
309 return aafs_create(name, S_IFDIR | 0755, parent, NULL, NULL, NULL, in aafs_create_dir()
325 struct dentry *parent, in aafs_create_symlink() argument
337 dent = aafs_create(name, S_IFLNK | 0444, parent, private, link, NULL, in aafs_create_symlink()
[all …]
Dlabel.c638 struct rb_node **new, *parent = NULL; in __label_insert() local
652 parent = *new; in __label_insert()
673 rb_link_node(&label->node, parent, new); in __label_insert()
1965 ns_unconfined(labels_ns(this)->parent)); in aa_labelset_destroy()
Dlsm.c122 static int apparmor_ptrace_traceme(struct task_struct *parent) in apparmor_ptrace_traceme() argument
128 tracer = aa_get_task_label(parent); in apparmor_ptrace_traceme()
1123 static void apparmor_sock_graft(struct sock *sk, struct socket *parent) in apparmor_sock_graft() argument
Ddomain.c1013 root = aa_get_profile_rcu(&profile->parent); in build_change_hat()
1075 root = aa_get_profile_rcu(&profile->parent); in change_hat()
/security/yama/
Dyama_lsm.c272 static int task_is_descendant(struct task_struct *parent, in task_is_descendant() argument
278 if (!parent || !child) in task_is_descendant()
282 if (!thread_group_leader(parent)) in task_is_descendant()
283 parent = rcu_dereference(parent->group_leader); in task_is_descendant()
287 if (walker == parent) { in task_is_descendant()
310 struct task_struct *parent = NULL; in ptracer_exception_found() local
319 parent = ptrace_parent(tracee); in ptracer_exception_found()
320 if (parent != NULL && same_thread_group(parent, tracer)) { in ptracer_exception_found()
332 parent = relation->tracer; in ptracer_exception_found()
338 if (found && (parent == NULL || task_is_descendant(parent, tracer))) in ptracer_exception_found()
[all …]
/security/
Dinode.c108 struct dentry *parent, void *data, in securityfs_create_dentry() argument
125 if (!parent) in securityfs_create_dentry()
126 parent = mount->mnt_root; in securityfs_create_dentry()
128 dir = d_inode(parent); in securityfs_create_dentry()
131 dentry = lookup_one_len2(name, mount, parent, strlen(name)); in securityfs_create_dentry()
201 struct dentry *parent, void *data, in securityfs_create_file() argument
204 return securityfs_create_dentry(name, mode, parent, data, fops, NULL); in securityfs_create_file()
228 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) in securityfs_create_dir() argument
230 return securityfs_create_file(name, S_IFDIR | 0755, parent, NULL, NULL); in securityfs_create_dir()
261 struct dentry *parent, in securityfs_create_symlink() argument
[all …]
Ddevice_cgroup.c177 struct dev_cgroup *parent_dev_cgroup = css_to_devcgroup(css->parent); in devcgroup_online()
450 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); in parent_has_perm() local
452 if (!parent) in parent_has_perm()
454 return verify_new_ex(parent, ex, childcg->behavior); in parent_has_perm()
471 struct dev_cgroup *parent = css_to_devcgroup(childcg->css.parent); in parent_allows_removal() local
473 if (!parent) in parent_allows_removal()
484 return !match_exception_partial(&parent->exceptions, ex->type, in parent_allows_removal()
494 static inline int may_allow_all(struct dev_cgroup *parent) in may_allow_all() argument
496 if (!parent) in may_allow_all()
498 return parent->behavior == DEVCG_DEFAULT_ALLOW; in may_allow_all()
[all …]
Dcommoncap.c90 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable()
97 ns = ns->parent; in cap_capable()
170 int cap_ptrace_traceme(struct task_struct *parent) in cap_ptrace_traceme() argument
176 cred = __task_cred(parent); in cap_ptrace_traceme()
181 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
330 for (ns = current_user_ns(); ; ns = ns->parent) { in rootid_owns_currentns()
Dsecurity.c701 int security_ptrace_traceme(struct task_struct *parent) in security_ptrace_traceme() argument
703 return call_int_hook(ptrace_traceme, 0, parent); in security_ptrace_traceme()
2096 void security_sock_graft(struct sock *sk, struct socket *parent) in security_sock_graft() argument
2098 call_void_hook(sock_graft, sk, parent); in security_sock_graft()
/security/tomoyo/
Dtomoyo.c152 static int tomoyo_path_unlink(const struct path *parent, struct dentry *dentry) in tomoyo_path_unlink() argument
154 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_unlink()
168 static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry, in tomoyo_path_mkdir() argument
171 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mkdir()
185 static int tomoyo_path_rmdir(const struct path *parent, struct dentry *dentry) in tomoyo_path_rmdir() argument
187 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_rmdir()
201 static int tomoyo_path_symlink(const struct path *parent, struct dentry *dentry, in tomoyo_path_symlink() argument
204 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_symlink()
219 static int tomoyo_path_mknod(const struct path *parent, struct dentry *dentry, in tomoyo_path_mknod() argument
222 struct path path = { .mnt = parent->mnt, .dentry = dentry }; in tomoyo_path_mknod()
Dsecurityfs_if.c224 struct dentry *parent, const u8 key) in tomoyo_create_entry() argument
226 securityfs_create_file(name, mode, parent, ((u8 *) NULL) + key, in tomoyo_create_entry()
/security/apparmor/include/
Dpolicy_ns.h60 struct aa_ns *parent; member
84 const char *aa_ns_name(struct aa_ns *parent, struct aa_ns *child, bool subns);
94 struct aa_ns *__aa_find_or_create_ns(struct aa_ns *parent, const char *name,
101 return rcu_dereference_protected(p->parent, in aa_deref_parent()
Dpolicy.h131 struct aa_profile __rcu *parent; member
180 struct aa_profile *aa_new_null_profile(struct aa_profile *parent, bool hat,
184 struct aa_profile *aa_find_child(struct aa_profile *parent, const char *name);
Dapparmorfs.h111 int __aafs_profile_mkdir(struct aa_profile *profile, struct dentry *parent);
113 int __aafs_ns_mkdir(struct aa_ns *ns, struct dentry *parent, const char *name,
/security/integrity/
Diint.c98 struct rb_node *node, *parent = NULL; in integrity_inode_get() local
113 parent = *p; in integrity_inode_get()
114 test_iint = rb_entry(parent, struct integrity_iint_cache, in integrity_inode_get()
125 rb_link_node(node, parent, p); in integrity_inode_get()
/security/keys/
Dkey.c53 struct rb_node *parent, **p; in key_user_lookup() local
56 parent = NULL; in key_user_lookup()
62 parent = *p; in key_user_lookup()
63 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
101 rb_link_node(&candidate->node, parent, p); in key_user_lookup()
135 struct rb_node *parent, **p; in key_alloc_serial() local
149 parent = NULL; in key_alloc_serial()
153 parent = *p; in key_alloc_serial()
154 xkey = rb_entry(parent, struct key, serial_node); in key_alloc_serial()
165 rb_link_node(&key->serial_node, parent, p); in key_alloc_serial()
[all …]
Dkeyctl.c1552 struct task_struct *me, *parent; in keyctl_session_to_parent() local
1583 parent = rcu_dereference_protected(me->real_parent, in keyctl_session_to_parent()
1587 if (parent->pid <= 1 || !parent->mm) in keyctl_session_to_parent()
1591 if (!thread_group_empty(parent)) in keyctl_session_to_parent()
1597 pcred = __task_cred(parent); in keyctl_session_to_parent()
1621 oldwork = task_work_cancel(parent, key_change_session_keyring); in keyctl_session_to_parent()
1625 ret = task_work_add(parent, newwork, true); in keyctl_session_to_parent()
/security/selinux/
Dhooks.c2144 static int selinux_ptrace_traceme(struct task_struct *parent) in selinux_ptrace_traceme() argument
2147 task_sid(parent), current_sid(), SECCLASS_PROCESS, in selinux_ptrace_traceme()
5168 static void selinux_sock_graft(struct sock *sk, struct socket *parent) in selinux_sock_graft() argument
5171 inode_security_novalidate(SOCK_INODE(parent)); in selinux_sock_graft()
/security/smack/
Dsmack_lsm.c4062 static void smack_sock_graft(struct sock *sk, struct socket *parent) in smack_sock_graft() argument