/security/keys/ |
H A D | permission.c | 91 unsigned long flags = key->flags; local 93 if (flags & (1 << KEY_FLAG_INVALIDATED)) 97 if (flags & ((1 << KEY_FLAG_REVOKED) |
|
H A D | internal.h | 114 unsigned flags; member in struct:keyring_search_context 152 unsigned long flags); 156 extern key_ref_t lookup_user_key(key_serial_t id, unsigned long flags, 210 key->flags & ((1 << KEY_FLAG_DEAD) |
|
H A D | process_keys.c | 221 unsigned long flags; local 228 flags = KEY_ALLOC_QUOTA_OVERRUN; 230 flags = KEY_ALLOC_IN_QUOTA; 234 flags, NULL); 522 .flags = KEYRING_SEARCH_NO_STATE_CHECK, 646 &ctx.cred->request_key_auth->flags)) { 716 !test_bit(KEY_FLAG_INSTANTIATED, &key->flags)) 830 if (unlikely(current->flags & PF_EXITING)) {
|
H A D | request_key.c | 180 if (test_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags) || 239 !test_bit(KEY_FLAG_REVOKED, &authkey->flags)); 276 &authkey->flags)) 332 unsigned long flags, 358 perm, flags); 362 set_bit(KEY_FLAG_USER_CONSTRUCT, &key->flags); 434 unsigned long flags) 448 ret = construct_alloc_key(ctx, dest_keyring, flags, user, &key); 485 * @flags: Flags to key_alloc(). 510 unsigned long flags) 330 construct_alloc_key(struct keyring_search_context *ctx, struct key *dest_keyring, unsigned long flags, struct key_user *user, struct key **_key) argument 429 construct_key_and_link(struct keyring_search_context *ctx, const char *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument 504 request_key_and_link(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument [all...] |
H A D | key.c | 203 * @flags: Flags specifying quota properties. 226 key_perm_t perm, unsigned long flags) 255 if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) { 262 if (!(flags & KEY_ALLOC_QUOTA_OVERRUN)) { 297 if (!(flags & KEY_ALLOC_NOT_IN_QUOTA)) 298 key->flags |= 1 << KEY_FLAG_IN_QUOTA; 299 if (flags & KEY_ALLOC_TRUSTED) 300 key->flags |= 1 << KEY_FLAG_TRUSTED; 307 ret = security_key_alloc(key, cred, flags); 321 if (!(flags 224 key_alloc(struct key_type *type, const char *desc, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags) argument 775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument [all...] |
H A D | keyring.c | 494 unsigned long flags, struct key *dest) 500 uid, gid, cred, perm, flags); 529 unsigned long kflags = key->flags; 540 if (ctx->flags & KEYRING_SEARCH_DO_STATE_CHECK) { 549 if (!(ctx->flags & KEYRING_SEARCH_SKIP_EXPIRED)) 563 if (!(ctx->flags & KEYRING_SEARCH_NO_CHECK_PERM) && 571 if (ctx->flags & KEYRING_SEARCH_DO_STATE_CHECK) { 633 BUG_ON((ctx->flags & STATE_CHECKS) == 0 || 634 (ctx->flags & STATE_CHECKS) == STATE_CHECKS); 660 if (keyring->flags 492 keyring_alloc(const char *description, kuid_t uid, kgid_t gid, const struct cred *cred, key_perm_t perm, unsigned long flags, struct key *dest) argument [all...] |
/security/apparmor/ |
H A D | context.c | 34 * @flags: gfp flags for allocation 38 struct aa_task_cxt *aa_alloc_task_context(gfp_t flags) argument 40 return kzalloc(sizeof(struct aa_task_cxt), flags);
|
H A D | lib.c | 82 * @flags: the type of memory to allocate (see kmalloc). 89 void *__aa_kvmalloc(size_t size, gfp_t flags) argument 98 buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN); 100 if (flags & __GFP_ZERO)
|
H A D | path.c | 48 * @flags: flags controlling path lookup 57 char **name, int flags) 82 if (flags & PATH_CHROOT_REL) { 118 !(flags & PATH_MEDIATE_DELETED)) { 135 if (!(flags & PATH_CONNECT_PATH) && 136 !(((flags & CHROOT_NSCONNECT) == CHROOT_NSCONNECT) && 154 * @flags: flags controlling path lookup 161 static int get_name_to_buffer(struct path *path, int flags, cha argument 56 d_namespace_path(struct path *path, char *buf, int buflen, char **name, int flags) argument 207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument [all...] |
H A D | match.c | 93 * @flags: flags controlling what type of accept table are acceptable 100 static int verify_dfa(struct aa_dfa *dfa, int flags) argument 113 if (ACCEPT1_FLAGS(flags)) { 119 if (ACCEPT2_FLAGS(flags)) { 138 if (flags & DFA_FLAG_VERIFY_STATES) { 195 * @flags: flags controlling what type of accept tables are acceptable 203 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags) argument 228 dfa->flags [all...] |
H A D | file.c | 95 * @gfp: allocation flags 172 /* the old mapping lock and link_subset flags where overlaid 272 * @flags: any additional path flags beyond what the profile specifies 279 int flags, u32 request, struct path_cond *cond) 286 flags |= profile->path_flags | (S_ISDIR(cond->mode) ? PATH_IS_DIR : 0); 287 error = aa_path_name(path, flags, &buffer, &name, &info); 278 aa_path_perm(int op, struct aa_profile *profile, struct path *path, int flags, u32 request, struct path_cond *cond) argument
|
H A D | policy_unpack.c | 299 * @flags: flags governing dfa 303 static bool verify_accept(struct aa_dfa *dfa, int flags) argument 342 int flags = TO_ACCEPT1_FLAG(YYTD_DATA32) | local 347 flags |= DFA_FLAG_VERIFY_STATES; 349 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); 354 if (!verify_accept(dfa, flags)) 513 /* per profile debug flags (complain, audit) */ 514 if (!unpack_nameX(e, AA_STRUCT, "flags")) 519 profile->flags | [all...] |
/security/ |
H A D | inode.c | 41 int flags, const char *dev_name, 44 return mount_single(fs_type, flags, data, fill_super); 40 get_sb(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument
|
H A D | commoncap.c | 535 /* if we have fs caps, clear dangerous personality flags */ 626 * @flags: The replacement flag 635 const void *value, size_t size, int flags) 729 * @flags: Indications of what has changed 734 int cap_task_fix_setuid(struct cred *new, const struct cred *old, int flags) argument 736 switch (flags) { 989 current->flags |= PF_SUPERPRIV; 995 unsigned long prot, unsigned long flags) 634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 994 cap_mmap_file(struct file *file, unsigned long reqprot, unsigned long prot, unsigned long flags) argument
|
/security/tomoyo/ |
H A D | mount.c | 34 r->param.mount.flags); 50 return tomoyo_compare_number_union(r->param.mount.flags, 51 &acl->flags) && 68 * @flags: Mount options. 77 unsigned long flags) 159 r->param.mount.flags = flags; 182 * @flags: Mount options. 188 const char *type, unsigned long flags, 198 if ((flags 74 tomoyo_mount_acl(struct tomoyo_request_info *r, const char *dev_name, struct path *dir, const char *type, unsigned long flags) argument 187 tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) argument [all...] |
H A D | tomoyo.c | 14 * @gfp: Memory allocation flags. 29 * @gfp: Memory allocation flags. 331 int flags = f->f_flags; local 335 return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags); 406 * @flags: Mount options. 412 const char *type, unsigned long flags, void *data) 414 return tomoyo_mount_permission(dev_name, path, type, flags, data); 421 * @flags: Unmount options. 425 static int tomoyo_sb_umount(struct vfsmount *mnt, int flags) argument 411 tomoyo_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
|
/security/selinux/ss/ |
H A D | sidtab.c | 203 unsigned long flags; local 211 spin_lock_irqsave(&s->lock, flags); 230 spin_unlock_irqrestore(&s->lock, flags); 293 unsigned long flags; local 296 spin_lock_irqsave(&src->lock, flags); 303 spin_unlock_irqrestore(&src->lock, flags); 308 unsigned long flags; local 310 spin_lock_irqsave(&s->lock, flags); 312 spin_unlock_irqrestore(&s->lock, flags);
|
/security/apparmor/include/ |
H A D | file.h | 25 * We use MAY_EXEC, MAY_WRITE, MAY_READ, MAY_APPEND and the following flags 54 * - flags - which modify how the destination name is applied 175 int flags, u32 request, struct path_cond *cond); 190 * aa_map_file_perms - map file flags to AppArmor permissions 191 * @file: open file to map flags to AppArmor permissions 197 int flags = file->f_flags; local 205 if ((flags & O_APPEND) && (perms & MAY_WRITE)) 208 if (flags & O_TRUNC) 210 if (flags & O_CREAT)
|
H A D | match.h | 71 /* ACCEPT & ACCEPT2 tables gets 6 dedicated flags, YYTD_DATAX define the 72 * first flags 98 u16 flags; member in struct:aa_dfa 119 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
|
H A D | policy.h | 43 #define PROFILE_IS_HAT(_profile) ((_profile)->flags & PFLAG_HAT) 45 #define PROFILE_INVALID(_profile) ((_profile)->flags & PFLAG_INVALID) 73 /* These flags must correspond with PATH_flags */ 173 * @flags: flags controlling profile behavior 174 * @path_flags: flags controlling path generation behavior 213 long flags; member in struct:aa_profile 367 orig->flags |= PFLAG_INVALID;
|
/security/integrity/ima/ |
H A D | ima_api.c | 174 int flags = IMA_MEASURE | IMA_AUDIT | IMA_APPRAISE; local 177 flags &= ~IMA_APPRAISE; 179 return ima_match_policy(inode, function, mask, flags); 209 if (!(iint->flags & IMA_COLLECTED)) { 233 iint->flags |= IMA_COLLECTED; 273 if (iint->flags & IMA_MEASURED) 286 iint->flags |= IMA_MEASURED; 300 if (iint->flags & IMA_AUDITED) 321 iint->flags |= IMA_AUDITED;
|
H A D | ima_policy.c | 23 /* flags definitions */ 48 unsigned int flags; member in struct:ima_rule_entry 74 {.action = DONT_MEASURE, .fsmagic = PROC_SUPER_MAGIC, .flags = IMA_FSMAGIC}, 75 {.action = DONT_MEASURE, .fsmagic = SYSFS_MAGIC, .flags = IMA_FSMAGIC}, 76 {.action = DONT_MEASURE, .fsmagic = DEBUGFS_MAGIC, .flags = IMA_FSMAGIC}, 77 {.action = DONT_MEASURE, .fsmagic = TMPFS_MAGIC, .flags = IMA_FSMAGIC}, 78 {.action = DONT_MEASURE, .fsmagic = DEVPTS_SUPER_MAGIC, .flags = IMA_FSMAGIC}, 79 {.action = DONT_MEASURE, .fsmagic = BINFMTFS_MAGIC, .flags = IMA_FSMAGIC}, 80 {.action = DONT_MEASURE, .fsmagic = SECURITYFS_MAGIC, .flags = IMA_FSMAGIC}, 81 {.action = DONT_MEASURE, .fsmagic = SELINUX_MAGIC, .flags 268 ima_match_policy(struct inode *inode, enum ima_hooks func, int mask, int flags) argument [all...] |
/security/selinux/include/ |
H A D | objsec.h | 66 unsigned short flags; /* which mount options were specified */ member in struct:superblock_security_struct
|
H A D | security.h | 48 /* Mask for just the mount related flags */ 50 /* Super block security struct flags for mount options */ 57 /* Non-mount related flags */ 110 u32 flags; member in struct:av_decision 138 /* definitions of av_decision.flags */
|
/security/integrity/ |
H A D | integrity.h | 19 /* iint action cache flags */ 29 /* iint cache flags */ 41 /* iint subaction appraise cache flags */ 108 unsigned long flags; member in struct:integrity_iint_cache
|