/security/tomoyo/ |
D | util.c | 592 struct tomoyo_domain_info *domain; in tomoyo_find_domain() local 597 list_for_each_entry_rcu(domain, &tomoyo_domain_list, list, in tomoyo_find_domain() 599 if (!domain->is_deleted && in tomoyo_find_domain() 600 !tomoyo_pathcmp(&name, domain->domainname)) in tomoyo_find_domain() 601 return domain; in tomoyo_find_domain() 998 struct tomoyo_domain_info *domain, const u8 index) in tomoyo_init_request_info() argument 1003 if (!domain) in tomoyo_init_request_info() 1004 domain = tomoyo_domain(); in tomoyo_init_request_info() 1005 r->domain = domain; in tomoyo_init_request_info() 1006 profile = domain->profile; in tomoyo_init_request_info() [all …]
|
D | common.c | 994 struct tomoyo_domain_info *domain = NULL; in tomoyo_select_domain() local 1010 domain = tomoyo_task(p)->domain_info; in tomoyo_select_domain() 1014 domain = tomoyo_find_domain(data + 7); in tomoyo_select_domain() 1016 domain = tomoyo_find_domain_by_qid(pid); in tomoyo_select_domain() 1019 head->w.domain = domain; in tomoyo_select_domain() 1025 if (domain) in tomoyo_select_domain() 1026 head->r.domain = &domain->list; in tomoyo_select_domain() 1030 if (domain && domain->is_deleted) in tomoyo_select_domain() 1091 struct tomoyo_domain_info *domain; in tomoyo_delete_domain() local 1099 list_for_each_entry_rcu(domain, &tomoyo_domain_list, list, in tomoyo_delete_domain() [all …]
|
D | domain.c | 165 const struct tomoyo_domain_info *domain = r->domain; in tomoyo_check_acl() local 167 const struct list_head *list = &domain->acl_info_list; in tomoyo_check_acl() 184 if (!test_bit(i, domain->group)) in tomoyo_check_acl() 186 list = &domain->ns->acl_group[i++]; in tomoyo_check_acl() 566 const struct tomoyo_domain_info *domain = tomoyo_domain(); in tomoyo_assign_domain() local 568 e.profile = domain->profile; in tomoyo_assign_domain() 569 memcpy(e.group, domain->group, sizeof(e.group)); in tomoyo_assign_domain() 630 ee->r.profile = r->domain->profile; in tomoyo_environ() 631 ee->r.mode = tomoyo_get_mode(r->domain->ns, ee->r.profile, in tomoyo_environ() 706 struct tomoyo_domain_info *domain = NULL; in tomoyo_find_next_domain() local [all …]
|
D | securityfs_if.c | 103 const char *domain = tomoyo_domain()->domainname->name; in tomoyo_read_self() local 104 loff_t len = strlen(domain); in tomoyo_read_self() 112 if (copy_to_user(buf, domain + pos, len)) in tomoyo_read_self() 237 struct tomoyo_domain_info *domain; in tomoyo_initerface_init() local 242 domain = tomoyo_domain(); in tomoyo_initerface_init() 244 if (domain != &tomoyo_kernel_domain) in tomoyo_initerface_init()
|
D | gc.c | 50 if (head->r.domain == element || head->r.group == element || in tomoyo_struct_used_by_io_buffer() 51 head->r.acl == element || &head->w.domain->list == element) in tomoyo_struct_used_by_io_buffer() 253 struct tomoyo_domain_info *domain = in tomoyo_del_domain() local 254 container_of(element, typeof(*domain), list); in tomoyo_del_domain() 263 list_for_each_entry_safe(acl, tmp, &domain->acl_info_list, list) { in tomoyo_del_domain() 267 tomoyo_put_name(domain->domainname); in tomoyo_del_domain() 532 struct tomoyo_domain_info *domain; in tomoyo_collect_entry() local 535 list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list, in tomoyo_collect_entry() 537 tomoyo_collect_acl(&domain->acl_info_list); in tomoyo_collect_entry() 538 if (!domain->is_deleted || atomic_read(&domain->users)) in tomoyo_collect_entry() [all …]
|
D | common.h | 431 struct tomoyo_domain_info *domain; member 803 struct list_head *domain; member 824 struct tomoyo_domain_info *domain; member 970 int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, 980 struct tomoyo_domain_info *domain, 1041 unsigned int tomoyo_check_flags(const struct tomoyo_domain_info *domain,
|
D | Makefile | 2 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
D | file.c | 579 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); in tomoyo_path_permission() 611 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); in tomoyo_execute_permission() 753 int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, in tomoyo_check_open_permission() argument 769 tomoyo_init_request_info(&r, domain, TOMOYO_MAC_FILE_OPEN) in tomoyo_check_open_permission()
|
D | audit.c | 253 const char *domainname = r->domain->domainname->name; in tomoyo_init_log() 372 if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type, in tomoyo_write_log2()
|
D | Kconfig | 86 domain/program checks for run-time policy modifications. Please enable
|
/security/apparmor/include/ |
D | domain.h | 35 void aa_free_domain_entries(struct aa_domain *domain);
|
/security/apparmor/ |
D | domain.c | 35 void aa_free_domain_entries(struct aa_domain *domain) in aa_free_domain_entries() argument 38 if (domain) { in aa_free_domain_entries() 39 if (!domain->table) in aa_free_domain_entries() 42 for (i = 0; i < domain->size; i++) in aa_free_domain_entries() 43 kzfree(domain->table[i]); in aa_free_domain_entries() 44 kzfree(domain->table); in aa_free_domain_entries() 45 domain->table = NULL; in aa_free_domain_entries()
|
D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/security/selinux/include/ |
D | security.h | 311 u16 domain, void *addr, u32 addrlen,
|
/security/smack/ |
D | smack_access.c | 546 skp->smk_netlabel.domain = skp->smk_known; in smk_import_entry()
|
D | smackfs.c | 2975 skp->smk_netlabel.domain = skp->smk_known; in smk_preset_netlabel()
|
/security/selinux/ss/ |
D | services.c | 2551 u16 domain, in security_node_sid() argument 2567 switch (domain) { in security_node_sid() 3756 secattr->domain = kstrdup(sym_name(policydb, SYM_TYPES, ctx->type - 1), in security_netlbl_sid_to_secattr() 3758 if (secattr->domain == NULL) in security_netlbl_sid_to_secattr()
|