Searched defs:name (Results 1 - 25 of 39) sorted by relevance

12

/security/selinux/include/
H A Davc_ss.h15 const char *name; member in struct:security_class_mapping
/security/apparmor/
H A Dlib.c25 * aa_split_fqname - split a fqname into a profile and namespace name
26 * @fqname: a full qualified name in namespace profile format (NOT NULL)
27 * @ns_name: pointer to portion of the string containing the ns name (NOT NULL)
29 * Returns: profile name or NULL if one is not specified
31 * Split a namespace name from a profile name (see policy.c for naming
32 * description). If a portion of the name is missing it returns NULL for
40 char *name = strim(fqname); local
43 if (name[0] == ':') {
44 char *split = strchr(&name[
[all...]
H A Dpath.c43 * d_namespace_path - lookup a name associated with a given path
47 * @name: Returns - pointer for start of path name with in @buf (NOT NULL)
50 * Handle path name lookup.
53 * When no error the path name is returned in @name which points to
57 char **name, int flags)
66 *name = res;
68 *name = buf;
72 strncmp(*name, "/sy
56 d_namespace_path(struct path *path, char *buf, int buflen, char **name, int flags) argument
161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument
207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument
[all...]
H A Dprocattr.c83 * split_token_from_name - separate a string of form <token>^<name>
88 * Returns: start position of name after token else NULL on failure
92 char *name; local
94 *token = simple_strtoull(args, &name, 16);
95 if ((name == args) || *name != '^') {
100 name++; /* skip ^ */
101 if (!*name)
102 name = NULL;
103 return name;
161 char *name, *ns_name; local
[all...]
H A Dfile.c98 * @name: name of object being mediated (MAYBE NULL)
99 * @target: name of target (MAYBE NULL)
107 gfp_t gfp, int op, u32 request, const char *name,
117 aad.name = name;
229 * aa_str_perms - find permission that match @name
232 * @name: string to match against dfa (NOT NULL)
234 * @perms: Returns - the permissions found when matching @name
236 * Returns: the final state in @dfa when beginning @start and walking @name
106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument
238 aa_str_perms(struct aa_dfa *dfa, unsigned int start, const char *name, struct path_cond *cond, struct file_perms *perms) argument
283 const char *name, *info = NULL; local
[all...]
H A Ddomain.c89 * @name: the name of the profile to change to (NOT NULL)
97 const char *name, u32 request,
112 aa_str_perms(profile->file.dfa, start, name, &cond, &perms);
117 /* try matching with namespace name and then profile */
118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name);
120 aa_str_perms(profile->file.dfa, state, name, &cond, &perms);
127 * @name - to match against (NOT NULL)
131 * preference where an exact match is preferred over a name which uses
139 static struct aa_profile *__attach_match(const char *name, argument
95 change_profile_perms(struct aa_profile *profile, struct aa_namespace *ns, const char *name, u32 request, unsigned int start) argument
173 find_attach(struct aa_namespace *ns, struct list_head *list, const char *name) argument
208 const char *name; local
227 next_name(int xtype, const char *name) argument
245 const char *name; local
300 x_to_profile(struct aa_profile *profile, const char *name, u32 xindex) argument
349 const char *name = NULL, *target = NULL, *info = NULL; local
588 char *name = kmalloc(strlen(n1) + strlen(n2) + 3, GFP_KERNEL); local
613 char *name = NULL; local
754 const char *name = NULL, *info = NULL; local
[all...]
H A Dapparmorfs.c34 * aa_mangle_name - mangle a profile name to std profile layout form
35 * @name: profile name to mangle (NOT NULL)
36 * @target: buffer to store mangled name, same length as @name (MAYBE NULL)
38 * Returns: length of mangled name
40 static int mangle_name(char *name, char *target) argument
44 while (*name == '/' || *name == '.')
45 name
386 create_profile_file(struct dentry *dir, const char *name, struct aa_profile *profile, const struct file_operations *fops) argument
501 __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent, const char *name) argument
[all...]
H A Dpolicy.c33 * inherit - special name to indicate profile inheritance
40 * a // in a profile or namespace name indicates a hierarchical name with the
41 * name before the // being the parent and the name after the child.
60 * eg. /bin/bash///bin/ls as a name would indicate /bin/ls was started
63 * A profile or namespace name that can contain one or more // separators
67 * An fqname is a name that may contain both namespace and profile hnames.
104 * @name: hname to find the base profile name componen
128 policy_init(struct aa_policy *policy, const char *prefix, const char *name) argument
181 __policy_find(struct list_head *head, const char *name) argument
274 alloc_namespace(const char *prefix, const char *name) argument
341 __aa_find_namespace(struct list_head *head, const char *name) argument
357 aa_find_namespace(struct aa_namespace *root, const char *name) argument
375 aa_prepare_namespace(const char *name) argument
691 char *name; local
736 __find_child(struct list_head *head, const char *name) argument
751 __strn_find_child(struct list_head *head, const char *name, int len) argument
764 aa_find_child(struct aa_profile *parent, const char *name) argument
903 audit_policy(int op, gfp_t gfp, const char *name, const char *info, int error) argument
1070 const char *ns_name, *name = NULL, *info = NULL; local
1244 const char *name = fqname, *info = NULL; local
[all...]
H A Dpolicy_unpack.c35 * which has a name (AA_NAME typecode followed by name string) followed by
46 AA_NAME, /* same as string except it is items name */
74 struct aa_profile *name = sa->aad->iface.target; local
75 audit_log_format(ab, " name=");
76 audit_log_untrustedstring(ab, name->base.hname);
85 * @name: name of the profile being manipulated (MAYBE NULL)
92 static int audit_iface(struct aa_profile *new, const char *name, argument
103 aad.name
166 unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name) argument
196 unpack_u32(struct aa_ext *e, u32 *data, const char *name) argument
209 unpack_u64(struct aa_ext *e, u64 *data, const char *name) argument
222 unpack_array(struct aa_ext *e, const char *name) argument
235 unpack_blob(struct aa_ext *e, char **blob, const char *name) argument
252 unpack_str(struct aa_ext *e, const char **string, const char *name) argument
274 unpack_strdup(struct aa_ext *e, char **string, const char *name) argument
478 const char *name = NULL; local
643 const char *name = NULL; local
[all...]
/security/integrity/
H A Ddigsig_asymmetric.c29 char name[12]; local
31 sprintf(name, "id:%08x", keyid);
33 pr_debug("key search: \"%s\"\n", name);
39 &key_type_asymmetric, name);
45 key = request_key(&key_type_asymmetric, name, NULL);
50 name, PTR_ERR(key));
H A Dintegrity_audit.c36 char name[TASK_COMM_LEN]; local
53 audit_log_untrustedstring(ab, get_task_comm(name, current));
55 audit_log_format(ab, " name=");
/security/
H A Dinode.c49 .name = "securityfs",
57 * @name: a pointer to a string containing the name of the file to create.
82 struct dentry *securityfs_create_file(const char *name, umode_t mode, argument
96 pr_debug("securityfs: creating file '%s'\n",name);
108 dentry = lookup_one_len(name, parent, strlen(name));
153 * @name: a pointer to a string containing the name of the directory to
159 * This function creates a directory in securityfs with the given @name
171 securityfs_create_dir(const char *name, struct dentry *parent) argument
[all...]
H A Dcommoncap.c623 * @name: The name of the xattr to be changed
634 int cap_inode_setxattr(struct dentry *dentry, const char *name, argument
637 if (!strcmp(name, XATTR_NAME_CAPS)) {
643 if (!strncmp(name, XATTR_SECURITY_PREFIX,
653 * @name: The name of the xattr to be changed
661 int cap_inode_removexattr(struct dentry *dentry, const char *name) argument
663 if (!strcmp(name, XATTR_NAME_CAPS)) {
669 if (!strncmp(name, XATTR_SECURITY_PREFI
[all...]
/security/integrity/ima/
H A Dima_template.c24 {.name = IMA_TEMPLATE_IMA_NAME, .fmt = IMA_TEMPLATE_IMA_FMT},
25 {.name = "ima-ng", .fmt = "d-ng|n-ng"},
26 {.name = "ima-sig", .fmt = "d-ng|n-ng|sig"},
43 static struct ima_template_desc *lookup_template_desc(const char *name);
51 * Verify that a template with the supplied name exists.
73 static struct ima_template_desc *lookup_template_desc(const char *name) argument
78 if (strcmp(defined_templates[i].name, name) == 0)
H A Dima.h74 char *name; member in struct:ima_template_desc
/security/tomoyo/
H A Dmemory.c14 * @function: Function's name.
143 * @name: The string to store into the permernent memory.
147 const struct tomoyo_path_info *tomoyo_get_name(const char *name) argument
154 if (!name)
156 len = strlen(name) + 1;
157 hash = full_name_hash((const unsigned char *) name, len - 1);
162 if (hash != ptr->entry.hash || strcmp(name, ptr->entry.name) ||
170 ptr->entry.name = ((char *) ptr) + sizeof(*ptr);
171 memmove((char *) ptr->entry.name, nam
[all...]
H A Drealpath.c167 /* Use filesystem name for unnamed devices. */
173 * Use filesystem name if filesystem does not support rename()
179 /* Prepend device name. */
181 char name[64]; local
184 name[sizeof(name) - 1] = '\0';
185 snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev),
187 name_len = strlen(name);
191 memmove(pos, name, name_le
197 const char *name = sb->s_type->name; local
253 char *name = NULL; local
[all...]
H A Dsecurityfs_if.c56 struct tomoyo_path_info name; local
58 name.name = data;
59 tomoyo_fill_path_info(&name);
63 r.param.task.domainname = &name;
108 const char *domain = tomoyo_domain()->domainname->name;
220 * @name: The name of the interface file.
227 static void __init tomoyo_create_entry(const char *name, const umode_t mode, argument
230 securityfs_create_file(name, mod
[all...]
H A Dcondition.c30 arg.name = arg_ptr;
49 * @env_name: The name of environment variable.
62 struct tomoyo_path_info name; local
64 name.name = env_name;
65 tomoyo_fill_path_info(&name);
66 value.name = env_value;
70 if (!tomoyo_path_matches_pattern(&name, envp->name))
233 exe.name
309 const struct tomoyo_path_info *name; local
[all...]
H A Ddomain.c191 * @name: Domainname to check.
195 static const char *tomoyo_last_word(const char *name) argument
197 const char *cp = strrchr(name, ' ');
200 return name;
278 * @domainname: The name of current domain.
279 * @program: The name of requested program.
305 if (strcmp(ptr->domainname->name, last_name))
320 * @domainname: The name of current domain.
321 * @program: The name of requested program.
336 const char *last_name = tomoyo_last_word(domainname->name);
422 tomoyo_find_namespace(const char *name, const unsigned int len) argument
465 char *name = (char *) (entry + 1); local
[all...]
H A Dfile.c73 * tomoyo_compare_name_union - Check whether a name matches "struct tomoyo_name_union" or not.
75 * @name: Pointer to "struct tomoyo_path_info".
78 * Returns "struct tomoyo_path_info" if @name matches @ptr, NULL otherwise.
81 tomoyo_compare_name_union(const struct tomoyo_path_info *name, argument
85 return tomoyo_path_matches_group(name, ptr->group);
86 if (tomoyo_path_matches_pattern(name, ptr->filename))
136 strcat((char *) buf->name, "/");
150 buf->name = tomoyo_realpath_from_path(path);
151 if (buf->name) {
169 r->param.path.filename->name);
[all...]
/security/apparmor/include/
H A Dapparmorfs.h29 const char *name; member in struct:aa_fs_entry
45 { .name = (_name), .mode = 0444, \
49 { .name = (_name), .mode = 0444, \
53 { .name = (_name), .mode = 0444, \
57 { .name = (_name), .v_type = AA_FS_TYPE_FOPS, \
60 { .name = (_name), .v_type = AA_FS_TYPE_DIR, .v.files = (_value) }
102 const char *name);
H A Daudit.h110 const char *name; member in struct:apparmor_audit_data
H A Dpolicy.h65 PFLAG_IX_ON_NAME_ERROR = 8, /* fallback to ix on name lookup fail */
80 * @name: name of the object
81 * @hname - The hierarchical name
86 char *name; member in struct:aa_policy
119 * unique. When profiles in separate namespaces have the same name they
161 * @base - base components of the profile (name, refcount, lists, lock ...)
167 * @rename: optional profile name that this profile renamed
182 * @dirname: name of the profile dir in apparmorfs
185 * has a name, an
[all...]
/security/keys/
H A Dprocess_keys.c744 * create a new one of that name and join that.
746 * If the name is NULL, an empty anonymous keyring will be installed as the
753 long join_session_keyring(const char *name) argument
765 /* if no name is provided, install an anonymous keyring */
766 if (!name) {
781 /* look for an existing keyring of this name */
782 keyring = find_keyring_by_name(name, false);
786 name, old->uid, old->gid, old,

Completed in 173 milliseconds

12