Searched defs:flags (Results 1 - 25 of 36) sorted by relevance

12

/security/keys/
H A Dpermission.c91 unsigned long flags = key->flags; local
93 if (flags & (1 << KEY_FLAG_INVALIDATED))
97 if (flags & ((1 << KEY_FLAG_REVOKED) |
H A Dinternal.h114 unsigned flags; member in struct:keyring_search_context
152 unsigned long flags);
156 extern key_ref_t lookup_user_key(key_serial_t id, unsigned long flags,
210 key->flags & ((1 << KEY_FLAG_DEAD) |
H A Dprocess_keys.c221 unsigned long flags; local
228 flags = KEY_ALLOC_QUOTA_OVERRUN;
230 flags = KEY_ALLOC_IN_QUOTA;
234 flags, NULL);
522 .flags = KEYRING_SEARCH_NO_STATE_CHECK,
646 &ctx.cred->request_key_auth->flags)) {
716 !test_bit(KEY_FLAG_INSTANTIATED, &key->flags))
830 if (unlikely(current->flags & PF_EXITING)) {
H A Drequest_key.c180 if (test_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags) ||
239 !test_bit(KEY_FLAG_REVOKED, &authkey->flags));
276 &authkey->flags))
332 unsigned long flags,
358 perm, flags);
362 set_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags);
434 unsigned long flags)
448 ret = construct_alloc_key(ctx, dest_keyring, flags, user, &key);
485 * @flags: Flags to key_alloc().
510 unsigned long flags)
330 construct_alloc_key(struct keyring_search_context *ctx, struct key *dest_keyring, unsigned long flags, struct key_user *user, struct key **_key) argument
429 construct_key_and_link(struct keyring_search_context *ctx, const char *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument
504 request_key_and_link(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument
[all...]
H A Dkey.c203 * @flags: Flags specifying quota properties.
226 key_perm_t perm, unsigned long flags)
255 if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) {
262 if (!(flags & KEY_ALLOC_QUOTA_OVERRUN)) {
297 if (!(flags & KEY_ALLOC_NOT_IN_QUOTA))
298 key->flags |= 1 << KEY_FLAG_IN_QUOTA;
299 if (flags & KEY_ALLOC_TRUSTED)
300 key->flags |= 1 << KEY_FLAG_TRUSTED;
307 ret = security_key_alloc(key, cred, flags);
321 if (!(flags
224 key_alloc(struct key_type *type, const char *desc, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags) argument
775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument
[all...]
H A Dkeyring.c494 unsigned long flags, struct key *dest)
500 uid, gid, cred, perm, flags);
529 unsigned long kflags = key->flags;
540 if (ctx->flags & KEYRING_SEARCH_DO_STATE_CHECK) {
549 if (!(ctx->flags & KEYRING_SEARCH_SKIP_EXPIRED))
563 if (!(ctx->flags & KEYRING_SEARCH_NO_CHECK_PERM) &&
571 if (ctx->flags & KEYRING_SEARCH_DO_STATE_CHECK) {
633 BUG_ON((ctx->flags & STATE_CHECKS) == 0 ||
634 (ctx->flags & STATE_CHECKS) == STATE_CHECKS);
660 if (keyring->flags
492 keyring_alloc(const char *description, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags, struct key *dest) argument
[all...]
/security/apparmor/
H A Dcontext.c34 * @flags: gfp flags for allocation
38 struct aa_task_cxt *aa_alloc_task_context(gfp_t flags) argument
40 return kzalloc(sizeof(struct aa_task_cxt), flags);
H A Dlib.c82 * @flags: the type of memory to allocate (see kmalloc).
89 void *__aa_kvmalloc(size_t size, gfp_t flags) argument
98 buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN);
100 if (flags & __GFP_ZERO)
H A Dpath.c48 * @flags: flags controlling path lookup
57 char **name, int flags)
82 if (flags & PATH_CHROOT_REL) {
118 !(flags & PATH_MEDIATE_DELETED)) {
135 if (!(flags & PATH_CONNECT_PATH) &&
136 !(((flags & CHROOT_NSCONNECT) == CHROOT_NSCONNECT) &&
154 * @flags: flags controlling path lookup
161 static int get_name_to_buffer(struct path *path, int flags, cha argument
56 d_namespace_path(struct path *path, char *buf, int buflen, char **name, int flags) argument
207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument
[all...]
H A Dmatch.c93 * @flags: flags controlling what type of accept table are acceptable
100 static int verify_dfa(struct aa_dfa *dfa, int flags) argument
113 if (ACCEPT1_FLAGS(flags)) {
119 if (ACCEPT2_FLAGS(flags)) {
138 if (flags & DFA_FLAG_VERIFY_STATES) {
195 * @flags: flags controlling what type of accept tables are acceptable
203 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags) argument
228 dfa->flags
[all...]
H A Dfile.c95 * @gfp: allocation flags
172 /* the old mapping lock and link_subset flags where overlaid
272 * @flags: any additional path flags beyond what the profile specifies
279 int flags, u32 request, struct path_cond *cond)
286 flags |= profile->path_flags | (S_ISDIR(cond->mode) ? PATH_IS_DIR : 0);
287 error = aa_path_name(path, flags, &buffer, &name, &info);
278 aa_path_perm(int op, struct aa_profile *profile, struct path *path, int flags, u32 request, struct path_cond *cond) argument
H A Dpolicy_unpack.c299 * @flags: flags governing dfa
303 static bool verify_accept(struct aa_dfa *dfa, int flags) argument
342 int flags = TO_ACCEPT1_FLAG(YYTD_DATA32) | local
347 flags |= DFA_FLAG_VERIFY_STATES;
349 dfa = aa_dfa_unpack(blob + pad, size - pad, flags);
354 if (!verify_accept(dfa, flags))
513 /* per profile debug flags (complain, audit) */
514 if (!unpack_nameX(e, AA_STRUCT, "flags"))
519 profile->flags |
[all...]
/security/
H A Dinode.c41 int flags, const char *dev_name,
44 return mount_single(fs_type, flags, data, fill_super);
40 get_sb(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument
H A Dcommoncap.c535 /* if we have fs caps, clear dangerous personality flags */
626 * @flags: The replacement flag
635 const void *value, size_t size, int flags)
729 * @flags: Indications of what has changed
734 int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags) argument
736 switch (flags) {
989 current->flags |= PF_SUPERPRIV;
995 unsigned long prot, unsigned long flags)
634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
994 cap_mmap_file(struct file *file, unsigned long reqprot, unsigned long prot, unsigned long flags) argument
/security/tomoyo/
H A Dmount.c34 r->param.mount.flags);
50 return tomoyo_compare_number_union(r->param.mount.flags,
51 &acl->flags) &&
68 * @flags: Mount options.
77 unsigned long flags)
159 r->param.mount.flags = flags;
182 * @flags: Mount options.
188 const char *type, unsigned long flags,
198 if ((flags
74 tomoyo_mount_acl(struct tomoyo_request_info *r, const char *dev_name, struct path *dir, const char *type, unsigned long flags) argument
187 tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) argument
[all...]
H A Dtomoyo.c14 * @gfp: Memory allocation flags.
29 * @gfp: Memory allocation flags.
331 int flags = f->f_flags; local
335 return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags);
406 * @flags: Mount options.
412 const char *type, unsigned long flags, void *data)
414 return tomoyo_mount_permission(dev_name, path, type, flags, data);
421 * @flags: Unmount options.
425 static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) argument
411 tomoyo_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
/security/selinux/ss/
H A Dsidtab.c203 unsigned long flags; local
211 spin_lock_irqsave(&s->lock, flags);
230 spin_unlock_irqrestore(&s->lock, flags);
293 unsigned long flags; local
296 spin_lock_irqsave(&src->lock, flags);
303 spin_unlock_irqrestore(&src->lock, flags);
308 unsigned long flags; local
310 spin_lock_irqsave(&s->lock, flags);
312 spin_unlock_irqrestore(&s->lock, flags);
/security/apparmor/include/
H A Dfile.h25 * We use MAY_EXEC, MAY_WRITE, MAY_READ, MAY_APPEND and the following flags
54 * - flags - which modify how the destination name is applied
175 int flags, u32 request, struct path_cond *cond);
190 * aa_map_file_perms - map file flags to AppArmor permissions
191 * @file: open file to map flags to AppArmor permissions
197 int flags = file->f_flags; local
205 if ((flags & O_APPEND) && (perms & MAY_WRITE))
208 if (flags & O_TRUNC)
210 if (flags & O_CREAT)
H A Dmatch.h71 /* ACCEPT & ACCEPT2 tables gets 6 dedicated flags, YYTD_DATAX define the
72 * first flags
98 u16 flags; member in struct:aa_dfa
119 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
H A Dpolicy.h43 #define PROFILE_IS_HAT(_profile) ((_profile)->flags & PFLAG_HAT)
45 #define PROFILE_INVALID(_profile) ((_profile)->flags & PFLAG_INVALID)
73 /* These flags must correspond with PATH_flags */
173 * @flags: flags controlling profile behavior
174 * @path_flags: flags controlling path generation behavior
213 long flags; member in struct:aa_profile
367 orig->flags |= PFLAG_INVALID;
/security/integrity/ima/
H A Dima_api.c174 int flags = IMA_MEASURE | IMA_AUDIT | IMA_APPRAISE; local
177 flags &= ~IMA_APPRAISE;
179 return ima_match_policy(inode, function, mask, flags);
209 if (!(iint->flags & IMA_COLLECTED)) {
233 iint->flags |= IMA_COLLECTED;
273 if (iint->flags & IMA_MEASURED)
286 iint->flags |= IMA_MEASURED;
300 if (iint->flags & IMA_AUDITED)
321 iint->flags |= IMA_AUDITED;
H A Dima_policy.c23 /* flags definitions */
48 unsigned int flags; member in struct:ima_rule_entry
74 {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC},
75 {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC},
76 {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC},
77 {.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC},
78 {.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC},
79 {.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC},
80 {.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC},
81 {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags
268 ima_match_policy(struct inode *inode, enum ima_hooks func, int mask, int flags) argument
[all...]
/security/selinux/include/
H A Dobjsec.h66 unsigned short flags; /* which mount options were specified */ member in struct:superblock_security_struct
H A Dsecurity.h48 /* Mask for just the mount related flags */
50 /* Super block security struct flags for mount options */
57 /* Non-mount related flags */
110 u32 flags; member in struct:av_decision
138 /* definitions of av_decision.flags */
/security/integrity/
H A Dintegrity.h19 /* iint action cache flags */
29 /* iint cache flags */
41 /* iint subaction appraise cache flags */
108 unsigned long flags; member in struct:integrity_iint_cache

Completed in 1620 milliseconds

12