/linux-6.6.21/security/apparmor/include/ ! |
D | mount.h | 28 int aa_remount(const struct cred *subj_cred, 32 int aa_bind_mount(const struct cred *subj_cred, 37 int aa_mount_change_type(const struct cred *subj_cred, 41 int aa_move_mount_old(const struct cred *subj_cred, 44 int aa_move_mount(const struct cred *subj_cred, 48 int aa_new_mount(const struct cred *subj_cred, 53 int aa_umount(const struct cred *subj_cred, 56 int aa_pivotroot(const struct cred *subj_cred,
|
D | file.h | 123 int aa_path_perm(const char *op, const struct cred *subj_cred, 127 int aa_path_link(const struct cred *subj_cred, struct aa_label *label, 131 int aa_file_perm(const char *op, const struct cred *subj_cred,
|
D | policy.h | 373 bool aa_policy_view_capable(const struct cred *subj_cred, 375 bool aa_policy_admin_capable(const struct cred *subj_cred, 377 int aa_may_manage_policy(const struct cred *subj_cred,
|
D | net.h | 96 int aa_af_perm(const struct cred *subj_cred, struct aa_label *label, 109 int aa_sock_file_perm(const struct cred *subj_cred, struct aa_label *label,
|
D | ipc.h | 16 int aa_may_signal(const struct cred *subj_cred, struct aa_label *sender,
|
D | capability.h | 39 int aa_capable(const struct cred *subj_cred, struct aa_label *label,
|
D | resource.h | 36 int aa_task_setrlimit(const struct cred *subj_cred, struct aa_label *label,
|
D | audit.h | 112 const struct cred *subj_cred; member
|
/linux-6.6.21/security/apparmor/ ! |
D | file.c | 48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb() 94 int aa_audit_file(const struct cred *subj_cred, in aa_audit_file() argument 103 ad.subj_cred = subj_cred; in aa_audit_file() 160 static int path_name(const char *op, const struct cred *subj_cred, in path_name() argument 173 aa_audit_file(subj_cred, in path_name() 228 static int __aa_path_perm(const char *op, const struct cred *subj_cred, in __aa_path_perm() argument 243 return aa_audit_file(subj_cred, in __aa_path_perm() 249 static int profile_path_perm(const char *op, const struct cred *subj_cred, in profile_path_perm() argument 261 error = path_name(op, subj_cred, &profile->label, path, in profile_path_perm() 266 return __aa_path_perm(op, subj_cred, profile, name, request, cond, in profile_path_perm() [all …]
|
D | mount.c | 132 static int audit_mount(const struct cred *subj_cred, in audit_mount() argument 171 ad.subj_cred = subj_cred; in audit_mount() 303 static int match_mnt_path_str(const struct cred *subj_cred, in match_mnt_path_str() argument 345 return audit_mount(subj_cred, profile, OP_MOUNT, mntpnt, devname, in match_mnt_path_str() 365 static int match_mnt(const struct cred *subj_cred, in match_mnt() argument 390 return match_mnt_path_str(subj_cred, profile, path, buffer, devname, in match_mnt() 394 int aa_remount(const struct cred *subj_cred, in aa_remount() argument 412 match_mnt(subj_cred, profile, path, buffer, NULL, in aa_remount() 420 int aa_bind_mount(const struct cred *subj_cred, in aa_bind_mount() argument 448 match_mnt(subj_cred, profile, path, buffer, &old_path, in aa_bind_mount() [all …]
|
D | resource.c | 56 static int audit_resource(const struct cred *subj_cred, in audit_resource() argument 64 ad.subj_cred = subj_cred; in audit_resource() 88 static int profile_setrlimit(const struct cred *subj_cred, in profile_setrlimit() argument 99 return audit_resource(subj_cred, profile, resource, new_rlim->rlim_max, in profile_setrlimit() 115 int aa_task_setrlimit(const struct cred *subj_cred, struct aa_label *label, in aa_task_setrlimit() argument 135 aa_capable(subj_cred, label, CAP_SYS_RESOURCE, CAP_OPT_NOAUDIT) != 0) in aa_task_setrlimit() 137 audit_resource(subj_cred, profile, resource, in aa_task_setrlimit() 142 profile_setrlimit(subj_cred, profile, resource, in aa_task_setrlimit()
|
D | domain.c | 629 static struct aa_label *profile_transition(const struct cred *subj_cred, in profile_transition() argument 720 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition() 731 static int profile_onexec(const struct cred *subj_cred, in profile_onexec() argument 800 return aa_audit_file(subj_cred, profile, &perms, OP_EXEC, in profile_onexec() 807 static struct aa_label *handle_onexec(const struct cred *subj_cred, in handle_onexec() argument 825 profile_onexec(subj_cred, profile, onexec, stack, in handle_onexec() 831 profile_transition(subj_cred, profile, bprm, in handle_onexec() 838 profile_onexec(subj_cred, profile, onexec, stack, bprm, in handle_onexec() 845 profile_transition(subj_cred, profile, bprm, in handle_onexec() 855 aa_audit_file(subj_cred, profile, &nullperms, in handle_onexec() [all …]
|
D | net.c | 138 int aa_af_perm(const struct cred *subj_cred, struct aa_label *label, in aa_af_perm() argument 149 static int aa_label_sk_perm(const struct cred *subj_cred, in aa_label_sk_perm() argument 164 ad.subj_cred = subj_cred; in aa_label_sk_perm() 189 int aa_sock_file_perm(const struct cred *subj_cred, struct aa_label *label, in aa_sock_file_perm() argument 196 return aa_label_sk_perm(subj_cred, label, op, request, sock->sk); in aa_sock_file_perm()
|
D | ipc.c | 92 ad->subj_cred = cred; in profile_signal_perm() 103 int aa_may_signal(const struct cred *subj_cred, struct aa_label *sender, in aa_may_signal() argument 113 profile_signal_perm(subj_cred, profile, target, in aa_may_signal()
|
D | capability.c | 152 int aa_capable(const struct cred *subj_cred, struct aa_label *label, in aa_capable() argument 159 ad.subj_cred = subj_cred; in aa_capable()
|
D | policy.c | 765 static int policy_ns_capable(const struct cred *subj_cred, in policy_ns_capable() argument 772 err = cap_capable(subj_cred, userns, cap, CAP_OPT_NONE); in policy_ns_capable() 774 err = aa_capable(subj_cred, label, cap, CAP_OPT_NONE); in policy_ns_capable() 790 bool aa_policy_view_capable(const struct cred *subj_cred, in aa_policy_view_capable() argument 793 struct user_namespace *user_ns = subj_cred->user_ns; in aa_policy_view_capable() 810 bool aa_policy_admin_capable(const struct cred *subj_cred, in aa_policy_admin_capable() argument 813 struct user_namespace *user_ns = subj_cred->user_ns; in aa_policy_admin_capable() 814 bool capable = policy_ns_capable(subj_cred, label, user_ns, in aa_policy_admin_capable() 820 return aa_policy_view_capable(subj_cred, label, ns) && capable && in aa_policy_admin_capable() 857 int aa_may_manage_policy(const struct cred *subj_cred, struct aa_label *label, in aa_may_manage_policy() argument [all …]
|
D | task.c | 238 ad->subj_cred = cred; in profile_ptrace_perm()
|