/security/tomoyo/ |
D | util.c | 614 struct tomoyo_domain_info *domain; in tomoyo_find_domain() local 619 list_for_each_entry_rcu(domain, &tomoyo_domain_list, list, in tomoyo_find_domain() 621 if (!domain->is_deleted && in tomoyo_find_domain() 622 !tomoyo_pathcmp(&name, domain->domainname)) in tomoyo_find_domain() 623 return domain; in tomoyo_find_domain() 1020 struct tomoyo_domain_info *domain, const u8 index) in tomoyo_init_request_info() argument 1025 if (!domain) in tomoyo_init_request_info() 1026 domain = tomoyo_domain(); in tomoyo_init_request_info() 1027 r->domain = domain; in tomoyo_init_request_info() 1028 profile = domain->profile; in tomoyo_init_request_info() [all …]
|
D | common.c | 994 struct tomoyo_domain_info *domain = NULL; in tomoyo_select_domain() local 1010 domain = tomoyo_task(p)->domain_info; in tomoyo_select_domain() 1014 domain = tomoyo_find_domain(data + 7); in tomoyo_select_domain() 1016 domain = tomoyo_find_domain_by_qid(pid); in tomoyo_select_domain() 1019 head->w.domain = domain; in tomoyo_select_domain() 1025 if (domain) in tomoyo_select_domain() 1026 head->r.domain = &domain->list; in tomoyo_select_domain() 1030 if (domain && domain->is_deleted) in tomoyo_select_domain() 1091 struct tomoyo_domain_info *domain; in tomoyo_delete_domain() local 1099 list_for_each_entry_rcu(domain, &tomoyo_domain_list, list, in tomoyo_delete_domain() [all …]
|
D | domain.c | 165 const struct tomoyo_domain_info *domain = r->domain; in tomoyo_check_acl() local 167 const struct list_head *list = &domain->acl_info_list; in tomoyo_check_acl() 184 if (!test_bit(i, domain->group)) in tomoyo_check_acl() 186 list = &domain->ns->acl_group[i++]; in tomoyo_check_acl() 564 const struct tomoyo_domain_info *domain = tomoyo_domain(); in tomoyo_assign_domain() local 566 e.profile = domain->profile; in tomoyo_assign_domain() 567 memcpy(e.group, domain->group, sizeof(e.group)); in tomoyo_assign_domain() 628 ee->r.profile = r->domain->profile; in tomoyo_environ() 629 ee->r.mode = tomoyo_get_mode(r->domain->ns, ee->r.profile, in tomoyo_environ() 704 struct tomoyo_domain_info *domain = NULL; in tomoyo_find_next_domain() local [all …]
|
D | securityfs_if.c | 103 const char *domain = tomoyo_domain()->domainname->name; in tomoyo_read_self() local 104 loff_t len = strlen(domain); in tomoyo_read_self() 112 if (copy_to_user(buf, domain + pos, len)) in tomoyo_read_self() 238 struct tomoyo_domain_info *domain; in tomoyo_initerface_init() local 243 domain = tomoyo_domain(); in tomoyo_initerface_init() 245 if (domain != &tomoyo_kernel_domain) in tomoyo_initerface_init()
|
D | gc.c | 50 if (head->r.domain == element || head->r.group == element || in tomoyo_struct_used_by_io_buffer() 51 head->r.acl == element || &head->w.domain->list == element) in tomoyo_struct_used_by_io_buffer() 253 struct tomoyo_domain_info *domain = in tomoyo_del_domain() local 254 container_of(element, typeof(*domain), list); in tomoyo_del_domain() 263 list_for_each_entry_safe(acl, tmp, &domain->acl_info_list, list) { in tomoyo_del_domain() 267 tomoyo_put_name(domain->domainname); in tomoyo_del_domain() 532 struct tomoyo_domain_info *domain; in tomoyo_collect_entry() local 535 list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list, in tomoyo_collect_entry() 537 tomoyo_collect_acl(&domain->acl_info_list); in tomoyo_collect_entry() 538 if (!domain->is_deleted || atomic_read(&domain->users)) in tomoyo_collect_entry() [all …]
|
D | common.h | 431 struct tomoyo_domain_info *domain; member 803 struct list_head *domain; member 824 struct tomoyo_domain_info *domain; member 970 int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, 980 struct tomoyo_domain_info *domain, 1041 unsigned int tomoyo_check_flags(const struct tomoyo_domain_info *domain,
|
D | Makefile | 2 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
D | file.c | 579 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); in tomoyo_path_permission() 611 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); in tomoyo_execute_permission() 753 int tomoyo_check_open_permission(struct tomoyo_domain_info *domain, in tomoyo_check_open_permission() argument 769 tomoyo_init_request_info(&r, domain, TOMOYO_MAC_FILE_OPEN) in tomoyo_check_open_permission()
|
D | audit.c | 253 const char *domainname = r->domain->domainname->name; in tomoyo_init_log() 373 if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type, in tomoyo_write_log2()
|
D | Kconfig | 86 domain/program checks for run-time policy modifications. Please enable
|
/security/landlock/ |
D | cred.h | 20 struct landlock_ruleset *domain; member 31 return landlock_cred(current_cred())->domain; in landlock_get_current_domain() 40 return landlock_cred(__task_cred(task))->domain; in landlock_get_task_domain()
|
D | cred.c | 20 struct landlock_ruleset *const old_dom = landlock_cred(old)->domain; in hook_cred_prepare() 24 landlock_cred(new)->domain = old_dom; in hook_cred_prepare() 31 struct landlock_ruleset *const dom = landlock_cred(cred)->domain; in hook_cred_free()
|
D | fs.c | 192 find_rule(const struct landlock_ruleset *const domain, in find_rule() argument 205 domain, rcu_dereference(landlock_inode(inode)->object)); in find_rule() 264 static int check_access_path(const struct landlock_ruleset *const domain, in check_access_path() argument 275 if (WARN_ON_ONCE(!domain || !path)) in check_access_path() 286 if (WARN_ON_ONCE(domain->num_layers < 1)) in check_access_path() 290 for (i = 0; i < domain->num_layers; i++) { in check_access_path() 296 if (domain->fs_access_masks[i] & BIT_ULL(access_bit)) { in check_access_path() 315 allowed = unmask_layers(find_rule(domain, walker_path.dentry), in check_access_path()
|
D | syscalls.c | 437 new_dom = landlock_merge_ruleset(new_llcred->domain, ruleset); in SYSCALL_DEFINE2() 444 landlock_put_ruleset(new_llcred->domain); in SYSCALL_DEFINE2() 445 new_llcred->domain = new_dom; in SYSCALL_DEFINE2()
|
/security/apparmor/include/ |
D | domain.h | 35 void aa_free_domain_entries(struct aa_domain *domain);
|
/security/apparmor/ |
D | domain.c | 37 void aa_free_domain_entries(struct aa_domain *domain) in aa_free_domain_entries() argument 40 if (domain) { in aa_free_domain_entries() 41 if (!domain->table) in aa_free_domain_entries() 44 for (i = 0; i < domain->size; i++) in aa_free_domain_entries() 45 kfree_sensitive(domain->table[i]); in aa_free_domain_entries() 46 kfree_sensitive(domain->table); in aa_free_domain_entries() 47 domain->table = NULL; in aa_free_domain_entries()
|
D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/security/smack/ |
D | smack_access.c | 528 skp->smk_netlabel.domain = skp->smk_known; in smack_populate_secattr()
|
/security/selinux/include/ |
D | security.h | 371 u16 domain, void *addr, u32 addrlen,
|
/security/selinux/ss/ |
D | services.c | 2659 u16 domain, in security_node_sid() argument 2681 switch (domain) { in security_node_sid() 3977 secattr->domain = kstrdup(sym_name(policydb, SYM_TYPES, ctx->type - 1), in security_netlbl_sid_to_secattr() 3979 if (secattr->domain == NULL) in security_netlbl_sid_to_secattr()
|