/security/landlock/ |
D | object.c | 42 void landlock_put_object(struct landlock_object *const object) in landlock_put_object() argument 49 if (!object) in landlock_put_object() 58 if (refcount_dec_and_lock(&object->usage, &object->lock)) { in landlock_put_object() 59 __acquire(&object->lock); in landlock_put_object() 64 object->underops->release(object); in landlock_put_object() 65 kfree_rcu(object, rcu_free); in landlock_put_object()
|
D | ruleset.c | 72 create_rule(struct landlock_object *const object, in create_rule() argument 93 landlock_get_object(object); in create_rule() 94 new_rule->object = object; in create_rule() 110 landlock_put_object(rule->object); in free_rule() 146 struct landlock_object *const object, in insert_rule() argument 156 if (WARN_ON_ONCE(!object || !layers)) in insert_rule() 163 if (this->object != object) { in insert_rule() 165 if (this->object < object) in insert_rule() 197 new_rule = create_rule(object, &this->layers, this->num_layers, in insert_rule() 210 new_rule = create_rule(object, layers, num_layers, NULL); in insert_rule() [all …]
|
D | fs.c | 43 static void release_inode(struct landlock_object *const object) in release_inode() argument 44 __releases(object->lock) in release_inode() 46 struct inode *const inode = object->underobj; in release_inode() 50 spin_unlock(&object->lock); in release_inode() 58 object->underobj = NULL; in release_inode() 65 spin_unlock(&object->lock); in release_inode() 72 rcu_assign_pointer(landlock_inode(inode)->object, NULL); in release_inode() 90 struct landlock_object *object, *new_object; in get_inode_object() local 95 object = rcu_dereference(inode_sec->object); in get_inode_object() 96 if (object) { in get_inode_object() [all …]
|
D | object.h | 25 void (*release)(struct landlock_object *const object) 26 __releases(object->lock); 83 void landlock_put_object(struct landlock_object *const object); 85 static inline void landlock_get_object(struct landlock_object *const object) in landlock_get_object() argument 87 if (object) in landlock_get_object() 88 refcount_inc(&object->usage); in landlock_get_object()
|
D | ruleset.h | 61 struct landlock_object *object; member 163 struct landlock_object *const object, 172 const struct landlock_object *const object);
|
D | Makefile | 3 landlock-y := setup.o syscalls.o object.o ruleset.o \
|
D | fs.h | 36 struct landlock_object __rcu *object; member
|
/security/keys/ |
D | keyring.c | 42 void *object = assoc_array_ptr_to_leaf(x); in keyring_ptr_to_key() local 43 return (struct key *)((unsigned long)object & ~KEYRING_PTR_SUBTYPE); in keyring_ptr_to_key() 303 static unsigned long keyring_get_object_key_chunk(const void *object, int level) in keyring_get_object_key_chunk() argument 305 const struct key *key = keyring_ptr_to_key(object); in keyring_get_object_key_chunk() 309 static bool keyring_compare_object(const void *object, const void *data) in keyring_compare_object() argument 312 const struct key *key = keyring_ptr_to_key(object); in keyring_compare_object() 325 static int keyring_diff_objects(const void *object, const void *data) in keyring_diff_objects() argument 327 const struct key *key_a = keyring_ptr_to_key(object); in keyring_diff_objects() 387 static void keyring_free_object(void *object) in keyring_free_object() argument 389 key_put(keyring_ptr_to_key(object)); in keyring_free_object() [all …]
|
D | internal.h | 132 int (*iterator)(const void *object, void *iterator_data);
|
/security/smack/ |
D | smack_access.c | 115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 136 if (object == &smack_known_web || subject == &smack_known_web) in smk_access() 141 if (object == &smack_known_star) in smk_access() 147 if (subject->smk_known == object->smk_known) in smk_access() 155 if (object == &smack_known_floor) in smk_access() 168 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access() 190 if (object == smack_unconfined) in smk_access() 199 smack_log(subject->smk_known, object->smk_known, in smk_access() 321 audit_log_untrustedstring(ab, sad->object); in smack_log_callback() 364 sad->object = object_label; in smack_log()
|
D | smack_lsm.c | 2587 struct smack_known *object, in smk_ipv6_check() argument 2605 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check() 2606 rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc); in smk_ipv6_check() 2713 struct smack_known *object; in smk_ipv6_port_check() local 2717 object = ssp->smk_in; in smk_ipv6_port_check() 2720 object = smack_ipv6host_label(address); in smk_ipv6_port_check() 2726 if (skp != NULL && object != NULL) in smk_ipv6_port_check() 2727 return smk_ipv6_check(skp, object, address, act); in smk_ipv6_port_check() 2730 if (object == NULL) in smk_ipv6_port_check() 2731 object = smack_net_ambient; in smk_ipv6_port_check() [all …]
|
D | smack.h | 258 char *object; member
|
D | smackfs.c | 315 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument 328 rule->smk_object = smk_import_entry(object, len); in smk_fill_rule() 341 cp = smk_parse_smack(object, len); in smk_fill_rule()
|
/security/ |
D | Kconfig | 139 validating memory ranges against heap object sizes in 150 are larger than the specified heap object, span multiple
|