/security/selinux/include/ |
H A D | avc_ss.h | 15 const char *name; member in struct:security_class_mapping
|
/security/apparmor/ |
H A D | lib.c | 25 * aa_split_fqname - split a fqname into a profile and namespace name 26 * @fqname: a full qualified name in namespace profile format (NOT NULL) 27 * @ns_name: pointer to portion of the string containing the ns name (NOT NULL) 29 * Returns: profile name or NULL if one is not specified 31 * Split a namespace name from a profile name (see policy.c for naming 32 * description). If a portion of the name is missing it returns NULL for 40 char *name = strim(fqname); local 43 if (name[0] == ':') { 44 char *split = strchr(&name[ [all...] |
H A D | path.c | 43 * d_namespace_path - lookup a name associated with a given path 47 * @name: Returns - pointer for start of path name with in @buf (NOT NULL) 50 * Handle path name lookup. 53 * When no error the path name is returned in @name which points to 57 char **name, int flags) 66 *name = res; 68 *name = buf; 72 strncmp(*name, "/sy 56 d_namespace_path(struct path *path, char *buf, int buflen, char **name, int flags) argument 161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument 207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument [all...] |
H A D | procattr.c | 83 * split_token_from_name - separate a string of form <token>^<name> 88 * Returns: start position of name after token else NULL on failure 92 char *name; local 94 *token = simple_strtoull(args, &name, 16); 95 if ((name == args) || *name != '^') { 100 name++; /* skip ^ */ 101 if (!*name) 102 name = NULL; 103 return name; 161 char *name, *ns_name; local [all...] |
H A D | file.c | 98 * @name: name of object being mediated (MAYBE NULL) 99 * @target: name of target (MAYBE NULL) 107 gfp_t gfp, int op, u32 request, const char *name, 117 aad.name = name; 229 * aa_str_perms - find permission that match @name 232 * @name: string to match against dfa (NOT NULL) 234 * @perms: Returns - the permissions found when matching @name 236 * Returns: the final state in @dfa when beginning @start and walking @name 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument 238 aa_str_perms(struct aa_dfa *dfa, unsigned int start, const char *name, struct path_cond *cond, struct file_perms *perms) argument 283 const char *name, *info = NULL; local [all...] |
H A D | domain.c | 89 * @name: the name of the profile to change to (NOT NULL) 97 const char *name, u32 request, 112 aa_str_perms(profile->file.dfa, start, name, &cond, &perms); 117 /* try matching with namespace name and then profile */ 118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name); 120 aa_str_perms(profile->file.dfa, state, name, &cond, &perms); 127 * @name - to match against (NOT NULL) 131 * preference where an exact match is preferred over a name which uses 139 static struct aa_profile *__attach_match(const char *name, argument 95 change_profile_perms(struct aa_profile *profile, struct aa_namespace *ns, const char *name, u32 request, unsigned int start) argument 173 find_attach(struct aa_namespace *ns, struct list_head *list, const char *name) argument 208 const char *name; local 227 next_name(int xtype, const char *name) argument 245 const char *name; local 300 x_to_profile(struct aa_profile *profile, const char *name, u32 xindex) argument 349 const char *name = NULL, *target = NULL, *info = NULL; local 588 char *name = kmalloc(strlen(n1) + strlen(n2) + 3, GFP_KERNEL); local 613 char *name = NULL; local 754 const char *name = NULL, *info = NULL; local [all...] |
H A D | apparmorfs.c | 34 * aa_mangle_name - mangle a profile name to std profile layout form 35 * @name: profile name to mangle (NOT NULL) 36 * @target: buffer to store mangled name, same length as @name (MAYBE NULL) 38 * Returns: length of mangled name 40 static int mangle_name(char *name, char *target) argument 44 while (*name == '/' || *name == '.') 45 name 386 create_profile_file(struct dentry *dir, const char *name, struct aa_profile *profile, const struct file_operations *fops) argument 501 __aa_fs_namespace_mkdir(struct aa_namespace *ns, struct dentry *parent, const char *name) argument [all...] |
H A D | policy.c | 33 * inherit - special name to indicate profile inheritance 40 * a // in a profile or namespace name indicates a hierarchical name with the 41 * name before the // being the parent and the name after the child. 60 * eg. /bin/bash///bin/ls as a name would indicate /bin/ls was started 63 * A profile or namespace name that can contain one or more // separators 67 * An fqname is a name that may contain both namespace and profile hnames. 104 * @name: hname to find the base profile name componen 128 policy_init(struct aa_policy *policy, const char *prefix, const char *name) argument 181 __policy_find(struct list_head *head, const char *name) argument 274 alloc_namespace(const char *prefix, const char *name) argument 341 __aa_find_namespace(struct list_head *head, const char *name) argument 357 aa_find_namespace(struct aa_namespace *root, const char *name) argument 375 aa_prepare_namespace(const char *name) argument 691 char *name; local 736 __find_child(struct list_head *head, const char *name) argument 751 __strn_find_child(struct list_head *head, const char *name, int len) argument 764 aa_find_child(struct aa_profile *parent, const char *name) argument 903 audit_policy(int op, gfp_t gfp, const char *name, const char *info, int error) argument 1070 const char *ns_name, *name = NULL, *info = NULL; local 1244 const char *name = fqname, *info = NULL; local [all...] |
H A D | policy_unpack.c | 35 * which has a name (AA_NAME typecode followed by name string) followed by 46 AA_NAME, /* same as string except it is items name */ 74 struct aa_profile *name = sa->aad->iface.target; local 75 audit_log_format(ab, " name="); 76 audit_log_untrustedstring(ab, name->base.hname); 85 * @name: name of the profile being manipulated (MAYBE NULL) 92 static int audit_iface(struct aa_profile *new, const char *name, argument 103 aad.name 166 unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name) argument 196 unpack_u32(struct aa_ext *e, u32 *data, const char *name) argument 209 unpack_u64(struct aa_ext *e, u64 *data, const char *name) argument 222 unpack_array(struct aa_ext *e, const char *name) argument 235 unpack_blob(struct aa_ext *e, char **blob, const char *name) argument 252 unpack_str(struct aa_ext *e, const char **string, const char *name) argument 274 unpack_strdup(struct aa_ext *e, char **string, const char *name) argument 478 const char *name = NULL; local 643 const char *name = NULL; local [all...] |
/security/integrity/ |
H A D | digsig_asymmetric.c | 29 char name[12]; local 31 sprintf(name, "id:%08x", keyid); 33 pr_debug("key search: \"%s\"\n", name); 39 &key_type_asymmetric, name); 45 key = request_key(&key_type_asymmetric, name, NULL); 50 name, PTR_ERR(key));
|
H A D | integrity_audit.c | 36 char name[TASK_COMM_LEN]; local 53 audit_log_untrustedstring(ab, get_task_comm(name, current)); 55 audit_log_format(ab, " name=");
|
/security/ |
H A D | inode.c | 49 .name = "securityfs", 57 * @name: a pointer to a string containing the name of the file to create. 82 struct dentry *securityfs_create_file(const char *name, umode_t mode, argument 96 pr_debug("securityfs: creating file '%s'\n",name); 108 dentry = lookup_one_len(name, parent, strlen(name)); 153 * @name: a pointer to a string containing the name of the directory to 159 * This function creates a directory in securityfs with the given @name 171 securityfs_create_dir(const char *name, struct dentry *parent) argument [all...] |
H A D | commoncap.c | 623 * @name: The name of the xattr to be changed 634 int cap_inode_setxattr(struct dentry *dentry, const char *name, argument 637 if (!strcmp(name, XATTR_NAME_CAPS)) { 643 if (!strncmp(name, XATTR_SECURITY_PREFIX, 653 * @name: The name of the xattr to be changed 661 int cap_inode_removexattr(struct dentry *dentry, const char *name) argument 663 if (!strcmp(name, XATTR_NAME_CAPS)) { 669 if (!strncmp(name, XATTR_SECURITY_PREFI [all...] |
/security/integrity/ima/ |
H A D | ima_template.c | 24 {.name = IMA_TEMPLATE_IMA_NAME, .fmt = IMA_TEMPLATE_IMA_FMT}, 25 {.name = "ima-ng", .fmt = "d-ng|n-ng"}, 26 {.name = "ima-sig", .fmt = "d-ng|n-ng|sig"}, 43 static struct ima_template_desc *lookup_template_desc(const char *name); 51 * Verify that a template with the supplied name exists. 73 static struct ima_template_desc *lookup_template_desc(const char *name) argument 78 if (strcmp(defined_templates[i].name, name) == 0)
|
H A D | ima.h | 74 char *name; member in struct:ima_template_desc
|
/security/tomoyo/ |
H A D | memory.c | 14 * @function: Function's name. 143 * @name: The string to store into the permernent memory. 147 const struct tomoyo_path_info *tomoyo_get_name(const char *name) argument 154 if (!name) 156 len = strlen(name) + 1; 157 hash = full_name_hash((const unsigned char *) name, len - 1); 162 if (hash != ptr->entry.hash || strcmp(name, ptr->entry.name) || 170 ptr->entry.name = ((char *) ptr) + sizeof(*ptr); 171 memmove((char *) ptr->entry.name, nam [all...] |
H A D | realpath.c | 167 /* Use filesystem name for unnamed devices. */ 173 * Use filesystem name if filesystem does not support rename() 179 /* Prepend device name. */ 181 char name[64]; local 184 name[sizeof(name) - 1] = '\0'; 185 snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev), 187 name_len = strlen(name); 191 memmove(pos, name, name_le 197 const char *name = sb->s_type->name; local 253 char *name = NULL; local [all...] |
H A D | securityfs_if.c | 56 struct tomoyo_path_info name; local 58 name.name = data; 59 tomoyo_fill_path_info(&name); 63 r.param.task.domainname = &name; 108 const char *domain = tomoyo_domain()->domainname->name; 220 * @name: The name of the interface file. 227 static void __init tomoyo_create_entry(const char *name, const umode_t mode, argument 230 securityfs_create_file(name, mod [all...] |
H A D | condition.c | 30 arg.name = arg_ptr; 49 * @env_name: The name of environment variable. 62 struct tomoyo_path_info name; local 64 name.name = env_name; 65 tomoyo_fill_path_info(&name); 66 value.name = env_value; 70 if (!tomoyo_path_matches_pattern(&name, envp->name)) 233 exe.name 309 const struct tomoyo_path_info *name; local [all...] |
H A D | domain.c | 191 * @name: Domainname to check. 195 static const char *tomoyo_last_word(const char *name) argument 197 const char *cp = strrchr(name, ' '); 200 return name; 278 * @domainname: The name of current domain. 279 * @program: The name of requested program. 305 if (strcmp(ptr->domainname->name, last_name)) 320 * @domainname: The name of current domain. 321 * @program: The name of requested program. 336 const char *last_name = tomoyo_last_word(domainname->name); 422 tomoyo_find_namespace(const char *name, const unsigned int len) argument 465 char *name = (char *) (entry + 1); local [all...] |
H A D | file.c | 73 * tomoyo_compare_name_union - Check whether a name matches "struct tomoyo_name_union" or not. 75 * @name: Pointer to "struct tomoyo_path_info". 78 * Returns "struct tomoyo_path_info" if @name matches @ptr, NULL otherwise. 81 tomoyo_compare_name_union(const struct tomoyo_path_info *name, argument 85 return tomoyo_path_matches_group(name, ptr->group); 86 if (tomoyo_path_matches_pattern(name, ptr->filename)) 136 strcat((char *) buf->name, "/"); 150 buf->name = tomoyo_realpath_from_path(path); 151 if (buf->name) { 169 r->param.path.filename->name); [all...] |
/security/apparmor/include/ |
H A D | apparmorfs.h | 29 const char *name; member in struct:aa_fs_entry 45 { .name = (_name), .mode = 0444, \ 49 { .name = (_name), .mode = 0444, \ 53 { .name = (_name), .mode = 0444, \ 57 { .name = (_name), .v_type = AA_FS_TYPE_FOPS, \ 60 { .name = (_name), .v_type = AA_FS_TYPE_DIR, .v.files = (_value) } 102 const char *name);
|
H A D | audit.h | 110 const char *name; member in struct:apparmor_audit_data
|
H A D | policy.h | 65 PFLAG_IX_ON_NAME_ERROR = 8, /* fallback to ix on name lookup fail */ 80 * @name: name of the object 81 * @hname - The hierarchical name 86 char *name; member in struct:aa_policy 119 * unique. When profiles in separate namespaces have the same name they 161 * @base - base components of the profile (name, refcount, lists, lock ...) 167 * @rename: optional profile name that this profile renamed 182 * @dirname: name of the profile dir in apparmorfs 185 * has a name, an [all...] |
/security/keys/ |
H A D | process_keys.c | 744 * create a new one of that name and join that. 746 * If the name is NULL, an empty anonymous keyring will be installed as the 753 long join_session_keyring(const char *name) argument 765 /* if no name is provided, install an anonymous keyring */ 766 if (!name) { 781 /* look for an existing keyring of this name */ 782 keyring = find_keyring_by_name(name, false); 786 name, old->uid, old->gid, old,
|