Home
last modified time | relevance | path

Searched refs:name (Results 1 – 25 of 111) sorted by relevance

12345

/security/apparmor/
A Dpath.c61 *name = *name + 1; in disconnect()
65 error = prepend(name, *name - buf, "/", 1); in disconnect()
67 error = prepend(name, *name - buf, disconnected, in disconnect()
100 *name = res; in d_namespace_path()
102 *name = buf; in d_namespace_path()
110 error = prepend(name, *name - buf, "/proc", 5); in d_namespace_path()
136 *name = buf; in d_namespace_path()
143 *name = buf; in d_namespace_path()
149 *name = res; in d_namespace_path()
171 if (!error && isdir && ((*name)[1] != '\0' || (*name)[0] != '/')) in d_namespace_path()
[all …]
A Dlib.c51 const char *name, size_t len) in val_table_find_ent() argument
189 if (!name) in aa_splitn_fqname()
192 if (name[0] == ':') { in aa_splitn_fqname()
193 char *split = strnchr(&name[1], end - &name[1], ':'); in aa_splitn_fqname()
194 *ns_name = skipn_spaces(&name[1], end - &name[1]); in aa_splitn_fqname()
207 name = NULL; in aa_splitn_fqname()
211 if (name && *name == 0) in aa_splitn_fqname()
212 name = NULL; in aa_splitn_fqname()
214 return name; in aa_splitn_fqname()
241 return str->name; in aa_str_alloc()
[all …]
A Dpolicy_ns.c83 static struct aa_profile *alloc_unconfined(const char *name) in alloc_unconfined() argument
87 profile = aa_alloc_null(NULL, name, GFP_KERNEL); in alloc_unconfined()
113 if (!aa_policy_init(&ns->base, prefix, name, GFP_KERNEL)) in alloc_ns()
210 ns = aa_get_ns(__aa_lookupn_ns(view, name, n)); in aa_lookupn_ns()
223 AA_BUG(!name); in __aa_create_ns()
226 ns = alloc_ns(parent->base.hname, name); in __aa_create_ns()
234 ns->base.name); in __aa_create_ns()
265 ns = aa_get_ns(__aa_find_ns(&parent->sub_ns, name)); in __aa_find_or_create_ns()
267 ns = __aa_create_ns(parent, name, dir); in __aa_find_or_create_ns()
289 ns = aa_get_ns(__aa_find_ns(&parent->sub_ns, name)); in aa_prepare_ns()
[all …]
A Dprocattr.c79 char *name; in split_token_from_name() local
81 *token = simple_strtoull(args, &name, 16); in split_token_from_name()
82 if ((name == args) || *name != '^') { in split_token_from_name()
87 name++; /* skip ^ */ in split_token_from_name()
88 if (!*name) in split_token_from_name()
89 name = NULL; in split_token_from_name()
90 return name; in split_token_from_name()
A Dpolicy.c440 return __strn_find_child(head, name, strlen(name)); in __find_child()
531 if (!name) in __create_missing_ancestors()
633 if (name) in aa_fqlookupn_profile()
706 if (name) { in aa_new_learning_profile()
708 goto name; in aa_new_learning_profile()
714 if (!name) in aa_new_learning_profile()
719 name: in aa_new_learning_profile()
745 kfree(name); in aa_new_learning_profile()
750 kfree(name); in aa_new_learning_profile()
808 ad.name = name; in audit_policy()
[all …]
A Dpolicy_unpack.c44 if (ad->name) { in audit_cb()
75 ad.name = name; in audit_iface()
239 if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag))) in aa_unpack_nameX()
241 } else if (name) { in aa_unpack_nameX()
865 if (*name == '\0') in unpack_profile()
868 tmpname = aa_splitn_fqname(name, strlen(name), &tmpns, &ns_len); in unpack_profile()
880 name = tmpname; in unpack_profile()
1147 name = NULL; in unpack_profile()
1148 else if (!name) in unpack_profile()
1149 name = "unknown"; in unpack_profile()
[all …]
A Ddomain.c397 AA_BUG(!name); in find_attach()
427 name, &count); in find_attach()
479 } else if (!strcmp(profile->base.name, name)) { in find_attach()
526 AA_BUG(!name); in x_table_lookup()
535 *name = next; in x_table_lookup()
601 name, info); in x_to_label()
605 name, info); in x_to_label()
773 name); in profile_transition()
1125 name = hats[i]; in change_hat()
1161 name = NULL; in change_hat()
[all …]
/security/selinux/
A Dgenheaders.c11 const char *name; member
62 for (i = 0; secclass_map[i].name; i++) { in main()
63 char *name = stoupperx(secclass_map[i].name); in main() local
66 free(name); in main()
89 char *name = stoupperx(secclass_map[i].name); in main() local
91 len = strlen(name); in main()
95 free(name); in main()
126 char *name = stoupperx(map->name); in main() local
128 len = strlen(name); in main()
134 map->name, map->perms[j]); in main()
[all …]
/security/tomoyo/
A Drealpath.c191 char name[64]; in tomoyo_get_local_path() local
195 name[sizeof(name) - 1] = '\0'; in tomoyo_get_local_path()
196 snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev), in tomoyo_get_local_path()
198 name_len = strlen(name); in tomoyo_get_local_path()
202 memmove(pos, name, name_len); in tomoyo_get_local_path()
208 const char *name = sb->s_type->name; in tomoyo_get_local_path() local
214 memmove(pos, name, name_len); in tomoyo_get_local_path()
240 char *name = NULL; in tomoyo_realpath_from_path() local
283 name = tomoyo_encode(pos); in tomoyo_realpath_from_path()
287 if (!name) in tomoyo_realpath_from_path()
[all …]
A Ddomain.c208 return name; in tomoyo_last_word()
444 if (strncmp(name, ns->name, len) || in tomoyo_find_namespace()
445 (name[len] && name[len] != ' ')) in tomoyo_find_namespace()
485 name[len] = '\0'; in tomoyo_assign_namespace()
486 entry->name = name; in tomoyo_assign_namespace()
731 if (exename.name && !strncmp(exename.name, "proc:/", 6)) { in tomoyo_find_next_domain()
735 if (!exename.name) { in tomoyo_find_next_domain()
737 if (!exename.name) in tomoyo_find_next_domain()
818 candidate->name); in tomoyo_find_next_domain()
829 old_domain->ns->name, candidate->name); in tomoyo_find_next_domain()
[all …]
A Dfile.c152 if (buf->name) { in tomoyo_get_realpath()
285 &acl->name); in tomoyo_check_path_number_acl()
330 &acl->name); in tomoyo_check_mkdev_acl()
347 return tomoyo_same_name_union(&p1->name, &p2->name); in tomoyo_same_path_acl()
419 return tomoyo_same_name_union(&p1->name, &p2->name) && in tomoyo_same_mkdev_acl()
639 return tomoyo_same_name_union(&p1->name, &p2->name) && in tomoyo_same_path_number_acl()
736 kfree(buf.name); in tomoyo_path_number_perm()
765 buf.name = NULL; in tomoyo_check_open_permission()
786 kfree(buf.name); in tomoyo_check_open_permission()
820 buf.name = NULL; in tomoyo_path_perm()
[all …]
A Dmemory.c152 const struct tomoyo_path_info *tomoyo_get_name(const char *name) in tomoyo_get_name() argument
159 if (!name) in tomoyo_get_name()
161 len = strlen(name) + 1; in tomoyo_get_name()
162 hash = full_name_hash(NULL, (const unsigned char *) name, len - 1); in tomoyo_get_name()
167 if (hash != ptr->entry.hash || strcmp(name, ptr->entry.name) || in tomoyo_get_name()
175 ptr->entry.name = ((char *) ptr) + sizeof(*ptr); in tomoyo_get_name()
176 memmove((char *) ptr->entry.name, name, len); in tomoyo_get_name()
201 tomoyo_kernel_namespace.name = "<kernel>"; in tomoyo_mm_init()
A Dsecurityfs_if.c55 struct tomoyo_path_info name; in tomoyo_write_self() local
58 name.name = data; in tomoyo_write_self()
59 tomoyo_fill_path_info(&name); in tomoyo_write_self()
63 r.param.task.domainname = &name; in tomoyo_write_self()
103 const char *domain = tomoyo_domain()->domainname->name; in tomoyo_read_self()
224 static void __init tomoyo_create_entry(const char *name, const umode_t mode, in tomoyo_create_entry() argument
227 securityfs_create_file(name, mode, parent, (void *) (uintptr_t) key, in tomoyo_create_entry()
A Denviron.c24 return tomoyo_path_matches_pattern(r->param.environ.name, acl->env); in tomoyo_check_env_acl()
37 r->param.environ.name->name); in tomoyo_audit_env_log()
57 environ.name = env; in tomoyo_env_perm()
60 r->param.environ.name = &environ; in tomoyo_env_perm()
/security/integrity/evm/
A Devm_secfs.c145 size += strlen(xattr->name) + 1; in evm_read_xattrs()
159 offset += strlen(xattr->name) + 1; in evm_read_xattrs()
210 if (IS_ERR(xattr->name)) { in evm_write_xattrs()
211 err = PTR_ERR(xattr->name); in evm_write_xattrs()
212 xattr->name = NULL; in evm_write_xattrs()
217 len = strlen(xattr->name); in evm_write_xattrs()
218 if (len && xattr->name[len-1] == '\n') in evm_write_xattrs()
219 xattr->name[len-1] = '\0'; in evm_write_xattrs()
224 if (strcmp(xattr->name, ".") == 0) { in evm_write_xattrs()
253 if (strcmp(xattr->name, tmp->name) == 0) { in evm_write_xattrs()
[all …]
A Devm_main.c40 .name = XATTR_NAME_SELINUX,
44 .name = XATTR_NAME_SMACK,
48 .name = XATTR_NAME_SMACKEXEC,
56 .name = XATTR_NAME_SMACKMMAP,
60 .name = XATTR_NAME_APPARMOR,
64 .name = XATTR_NAME_IMA,
68 .name = XATTR_NAME_CAPS,
359 xattr->name, NULL, 0); in evm_read_protected_xattrs()
653 const char *name, in evm_inode_set_acl_change() argument
1162 .name = "evm",
[all …]
A Devm_crypto.c203 static void dump_security_xattr(const char *name, const char *value, in dump_security_xattr() argument
207 pr_debug("%s: (%zu) [%*phN]\n", name, value_len, in dump_security_xattr()
210 dump_security_xattr_l(name, value, value_len); in dump_security_xattr()
251 if (strcmp(xattr->name, XATTR_NAME_IMA) == 0) in evm_calc_hmac_or_hash()
262 && !strcmp(xattr->name, req_xattr_name)) { in evm_calc_hmac_or_hash()
274 size = vfs_getxattr_alloc(&nop_mnt_idmap, dentry, xattr->name, in evm_calc_hmac_or_hash()
284 xattr->name, NULL, 0); in evm_calc_hmac_or_hash()
287 dentry->d_name.name, xattr->name, size, in evm_calc_hmac_or_hash()
295 dump_security_xattr(xattr->name, xattr_value, xattr_size); in evm_calc_hmac_or_hash()
411 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac()
[all …]
/security/integrity/
A Ddigsig_asymmetric.c25 char name[12]; in request_asymmetric_key() local
27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key()
29 pr_debug("key search: \"%s\"\n", name); in request_asymmetric_key()
36 &key_type_asymmetric, name, true); in request_asymmetric_key()
38 pr_err("Key '%s' is in ima_blacklist_keyring\n", name); in request_asymmetric_key()
48 &key_type_asymmetric, name, true); in request_asymmetric_key()
54 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key()
60 name, keyring->description, in request_asymmetric_key()
64 name, PTR_ERR(key)); in request_asymmetric_key()
/security/
A Dlsm_syscalls.c27 u64 lsm_name_to_attr(const char *name) in lsm_name_to_attr() argument
29 if (!strcmp(name, "current")) in lsm_name_to_attr()
31 if (!strcmp(name, "exec")) in lsm_name_to_attr()
33 if (!strcmp(name, "fscreate")) in lsm_name_to_attr()
35 if (!strcmp(name, "keycreate")) in lsm_name_to_attr()
37 if (!strcmp(name, "prev")) in lsm_name_to_attr()
39 if (!strcmp(name, "sockcreate")) in lsm_name_to_attr()
A Dinode.c71 .name = "securityfs",
107 static struct dentry *securityfs_create_dentry(const char *name, umode_t mode, in securityfs_create_dentry() argument
120 pr_debug("securityfs: creating file '%s'\n",name); in securityfs_create_dentry()
133 dentry = lookup_noperm(&QSTR(name), parent); in securityfs_create_dentry()
202 struct dentry *securityfs_create_file(const char *name, umode_t mode, in securityfs_create_file() argument
206 return securityfs_create_dentry(name, mode, parent, data, fops, NULL); in securityfs_create_file()
230 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) in securityfs_create_dir() argument
232 return securityfs_create_file(name, S_IFDIR | 0755, parent, NULL, NULL); in securityfs_create_dir()
262 struct dentry *securityfs_create_symlink(const char *name, in securityfs_create_symlink() argument
275 dent = securityfs_create_dentry(name, S_IFLNK | 0444, parent, in securityfs_create_symlink()
/security/apparmor/include/
A Dpolicy_ns.h91 struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n);
92 struct aa_ns *__aa_find_or_create_ns(struct aa_ns *parent, const char *name,
94 struct aa_ns *aa_prepare_ns(struct aa_ns *root, const char *name);
140 const char *name, size_t n) in __aa_findn_ns() argument
142 return (struct aa_ns *)__policy_strn_find(head, name, n); in __aa_findn_ns()
146 const char *name) in __aa_find_ns() argument
148 return __aa_findn_ns(head, name, strlen(name)); in __aa_find_ns()
A Dpolicy_unpack.h105 char *name; member
172 bool aa_unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name);
173 bool aa_unpack_u32(struct aa_ext *e, u32 *data, const char *name);
174 bool aa_unpack_u64(struct aa_ext *e, u64 *data, const char *name);
175 bool aa_unpack_array(struct aa_ext *e, const char *name, u16 *size);
176 size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name);
177 int aa_unpack_str(struct aa_ext *e, const char **string, const char *name);
178 int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name);
A Dapparmorfs.h27 const char *name; member
43 { .name = (_name), .mode = 0444, \
47 { .name = (_name), .mode = 0444, \
51 { .name = (_name), .mode = 0444, \
55 { .name = (_name), .v_type = AA_SFS_TYPE_FOPS, \
58 { .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) }
113 int __aafs_ns_mkdir(struct aa_ns *ns, struct dentry *parent, const char *name,
/security/integrity/ima/
A Dima_template.c21 {.name = "ima-ng", .fmt = "d-ng|n-ng"},
22 {.name = "ima-sig", .fmt = "d-ng|n-ng|sig"},
23 {.name = "ima-ngv2", .fmt = "d-ngv2|n-ng"},
24 {.name = "ima-sigv2", .fmt = "d-ngv2|n-ng|sig"},
25 {.name = "ima-buf", .fmt = "d-ng|n-ng|buf"},
27 {.name = "evm-sig",
170 if ((strcmp(template_desc->name, name) == 0) || in lookup_template_desc()
171 (strcmp(template_desc->fmt, name) == 0)) { in lookup_template_desc()
303 (strlen(template->name) ? in ima_init_template()
319 (strlen(template->name) ? in ima_init_template()
[all …]
/security/selinux/ss/
A Dsymtab.c48 int symtab_insert(struct symtab *s, char *name, void *datum) in symtab_insert() argument
50 return hashtab_insert(&s->table, name, datum, symtab_key_params); in symtab_insert()
53 void *symtab_search(struct symtab *s, const char *name) in symtab_search() argument
55 return hashtab_search(&s->table, name, symtab_key_params); in symtab_search()

Completed in 38 milliseconds

12345