Searched defs:type (Results 1 - 25 of 37) sorted by relevance

12

/security/apparmor/
H A Daudit.c117 audit_log_string(ab, aa_audit_type[sa->aad->type]);
151 * @cb: optional callback fn for type specific fields (MAYBE NULL)
153 void aa_audit_msg(int type, struct common_audit_data *sa, argument
156 sa->aad->type = type;
162 * @type: audit type for the message
166 * @cb: optional callback fn for type specific fields (MAYBE NULL)
172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument
178 if (type
[all...]
H A Dcapability.c68 int type = AUDIT_APPARMOR_AUTO; local
71 sa.type = LSM_AUDIT_DATA_CAP;
82 type = AUDIT_APPARMOR_AUDIT;
85 type = AUDIT_APPARMOR_KILL;
107 return aa_audit(type, profile, GFP_ATOMIC, &sa, audit_cb);
H A Dfile.c110 int type = AUDIT_APPARMOR_AUTO; local
113 sa.type = LSM_AUDIT_DATA_NONE;
134 type = AUDIT_APPARMOR_AUDIT;
140 type = AUDIT_APPARMOR_KILL;
153 return aa_audit(type, profile, gfp, &sa, file_audit_cb);
/security/selinux/include/
H A Dnetlabel.h50 u32 *type,
95 u32 *type,
98 *type = NETLBL_NLTYPE_NONE;
93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
H A Dsecurity.h121 u8 type; member in struct:operation_decision
135 u32 type[8]; /* 256 types */ member in struct:operation
146 u8 type, struct operation_decision *od);
/security/selinux/ss/
H A Dcontext.h24 * identity, a role, a type and a MLS range.
29 u32 type; member in struct:context
123 dst->type = src->type;
143 c->user = c->role = c->type = 0;
158 (c1->type == c2->type) &&
H A Davtab.h4 * by a type pair and a class. An access vector
5 * table is used to represent the type enforcement
29 u16 source_type; /* source type */
30 u16 target_type; /* target type */
59 u8 type; member in struct:avtab_operation
65 u32 data; /* access vector or type value */
/security/tomoyo/
H A Dgroup.c67 * @type: Type of this group.
71 int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type) argument
73 struct tomoyo_group *group = tomoyo_get_group(param, type);
78 if (type == TOMOYO_PATH_GROUP) {
88 } else if (type == TOMOYO_NUMBER_GROUP) {
H A Dmount.c33 r->param.mount.type->name,
52 tomoyo_compare_name_union(r->param.mount.type,
67 * @type: Name of filesystem type.
76 struct path *dir, const char *type,
93 requested_type = tomoyo_encode(type);
110 if (type == tomoyo_mounts[TOMOYO_MOUNT_REMOUNT]) {
112 } else if (type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_UNBINDABLE] ||
113 type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_PRIVATE] ||
114 type
74 tomoyo_mount_acl(struct tomoyo_request_info *r, const char *dev_name, struct path *dir, const char *type, unsigned long flags) argument
187 tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) argument
[all...]
H A Dgc.c155 switch (acl->type) {
367 * @type: One of values in "enum tomoyo_policy_id".
374 static void tomoyo_try_to_gc(const enum tomoyo_policy_id type, argument
395 switch (type) {
448 if (type == TOMOYO_ID_DOMAIN)
H A Ddomain.c72 return a->type == b->type && a->cond == b->cond;
112 !(new_entry->type == TOMOYO_TYPE_PATH_ACL &&
150 * @check_entry: Callback function to check type specific parameters.
167 if (ptr->is_deleted || ptr->type != r->param_type)
220 return p1->type == p2->type && p1->is_last_name == p2->is_last_name
229 * @type: Type of this entry.
234 const u8 type)
236 struct tomoyo_transition_control e = { .type
233 tomoyo_write_transition_control(struct tomoyo_acl_param *param, const u8 type) argument
287 tomoyo_scan_transition(const struct list_head *list, const struct tomoyo_path_info *domainname, const struct tomoyo_path_info *program, const char *last_name, const enum tomoyo_transition_type type) argument
337 enum tomoyo_transition_type type = TOMOYO_TRANSITION_CONTROL_NO_RESET; local
[all...]
H A Dfile.c213 const u8 type = r->param.path_number.operation; local
216 switch (type) {
234 [tomoyo_pn2mac[type]],
382 .head.type = TOMOYO_TYPE_PATH_ACL,
455 .head.type = TOMOYO_TYPE_MKDEV_ACL,
531 .head.type = TOMOYO_TYPE_PATH2_ACL,
563 r->type = tomoyo_p2mac[operation];
564 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type);
595 r->type = TOMOYO_MAC_FILE_EXECUTE;
596 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type);
690 tomoyo_path_number_perm(const u8 type, struct path *path, unsigned long number) argument
997 u8 type; local
[all...]
H A Dnetwork.c283 struct tomoyo_inet_acl e = { .head.type = TOMOYO_TYPE_INET_ACL };
285 u8 type; local
292 for (type = 0; type < TOMOYO_MAX_NETWORK_OPERATION; type++)
293 if (tomoyo_permstr(operation, tomoyo_socket_keyword[type]))
294 e.perm |= 1 << type;
328 struct tomoyo_unix_acl e = { .head.type = TOMOYO_TYPE_UNIX_ACL };
330 u8 type; local
337 for (type
471 const u8 type = tomoyo_inet2mac[address->protocol][address->operation]; local
546 const u8 type = tomoyo_unix2mac[address->protocol][address->operation]; local
649 const unsigned int type = sock->type; local
685 const unsigned int type = sock->type; local
722 const unsigned int type = sock->type; local
757 const unsigned int type = sock->type; local
[all...]
H A Dtomoyo.c240 int type = TOMOYO_TYPE_CREATE; local
245 type = TOMOYO_TYPE_MKCHAR;
248 type = TOMOYO_TYPE_MKBLOCK;
253 return tomoyo_mkdev_perm(type, &path, perm, dev);
257 type = TOMOYO_TYPE_MKFIFO;
260 type = TOMOYO_TYPE_MKSOCK;
263 return tomoyo_path_number_perm(type, &path, perm);
405 * @type: Name of filesystem type. Maybe NULL.
412 const char *type, unsigne
411 tomoyo_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
[all...]
/security/selinux/
H A Dnetlabel.c192 * @type: NetLabel labeling protocol type
203 u32 *type,
220 *type = secattr.type;
201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
/security/integrity/evm/
H A Devm_crypto.c21 #include <keys/encrypted-type.h>
35 static struct shash_desc *init_desc(char type) argument
42 if (type == EVM_XATTR_HMAC) {
62 if (type == EVM_XATTR_HMAC) {
132 char type, char *digest)
144 desc = init_desc(type);
209 xattr_data.type = EVM_XATTR_HMAC;
128 evm_calc_hmac_or_hash(struct dentry *dentry, const char *req_xattr_name, const char *req_xattr_value, size_t req_xattr_value_len, char type, char *digest) argument
/security/keys/
H A Drequest_key.c231 if (key->type->request_key)
232 actor = key->type->request_key;
343 ctx->index_key.type->name, ctx->index_key.description);
350 if (ctx->index_key.type->read)
352 if (ctx->index_key.type == &key_type_keyring ||
353 ctx->index_key.type->update)
356 key = key_alloc(ctx->index_key.type, ctx->index_key.description,
479 * @type: The type of key we want.
504 struct key *request_key_and_link(struct key_type *type, argument
615 request_key(struct key_type *type, const char *description, const char *callout_info) argument
652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument
713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
[all...]
H A Dkey.c196 * key_alloc - Allocate a key of the specified type.
197 * @type: The type of key to allocate.
205 * Allocate a key of the specified type with the attributes given. The key is
210 * the user's key data quota has the default for the key type reserved. The
219 * Note that the caller needs to ensure the key type isn't uninstantiated.
221 * be done by either never unregistering the key type, or making sure
224 struct key *key_alloc(struct key_type *type, const char *desc, argument
237 if (type->vet_description) {
238 ret = type
661 key_type_lookup(const char *type) argument
775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument
[all...]
H A Dkeyctl.c31 static int key_get_type_from_user(char *type, argument
37 ret = strncpy_from_user(type, _type, len);
42 if (type[0] == '.')
44 type[len - 1] = '\0';
52 * If the description is NULL or an empty string, the key type is asked to
67 char type[32], *description; local
77 ret = key_get_type_from_user(type, _type, sizeof(type));
92 (strncmp(type, "keyring", 7) == 0)) {
128 key_ref = key_create_or_update(keyring_ref, type, descriptio
173 char type[32], *description, *callout_info; local
640 char type[32], *description; local
[all...]
H A Dkeyring.c19 #include <keys/keyring-type.h>
20 #include <keys/user-type.h>
53 if (key->type == &key_type_keyring)
72 * The keyring key type definition. Keyrings are simply keys of this type and
169 * Hash a key type and description.
176 unsigned long hash, type; local
181 type = (unsigned long)index_key->type;
183 acc = mult_64x32_and_fold(type, desc_le
889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument
[all...]
/security/apparmor/include/
H A Daudit.h108 int type; member in struct:apparmor_audit_data
134 void aa_audit_msg(int type, struct common_audit_data *sa,
136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
/security/integrity/
H A Dintegrity.h68 u8 type; member in struct:evm_ima_xattr_data
80 u8 type; member in struct:ima_digest_data::__anon13::__anon14
83 u8 type; member in struct:ima_digest_data::__anon13::__anon15
95 uint8_t type; /* xattr type */ member in struct:signature_v2_hdr
/security/
H A Ddevice_cgroup.c42 short type; member in struct:dev_exception_item
105 if (walk->type != ex->type)
133 if (walk->type != ex->type)
256 static char type_to_char(short type) argument
258 if (type == DEV_ALL)
260 if (type == DEV_CHAR)
262 if (type == DEV_BLOCK)
299 seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type),
321 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
358 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
812 __devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument
838 short type, access = 0; local
855 short type; local
[all...]
/security/integrity/ima/
H A Dima_policy.c58 int type; /* audit type */ member in struct:ima_rule_entry::__anon10
147 result = security_filter_rule_init(entry->lsm[i].type,
203 rule->lsm[i].type,
213 rule->lsm[i].type,
261 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
420 entry->lsm[lsm_rule].type = audit_type;
421 result = security_filter_rule_init(entry->lsm[lsm_rule].type,
/security/smack/
H A Dsmack.h351 char type)
354 a->a.type = type;
360 char type, struct lsm_network_audit *net)
362 smk_ad_init(a, func, type);
396 char type)
350 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument
359 smk_ad_init_net(struct smk_audit_info *a, const char *func, char type, struct lsm_network_audit *net) argument
395 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument

Completed in 2669 milliseconds

12