| /security/apparmor/ |
| A D | path.c | 61 *name = *name + 1; in disconnect() 65 error = prepend(name, *name - buf, "/", 1); in disconnect() 67 error = prepend(name, *name - buf, disconnected, in disconnect() 100 *name = res; in d_namespace_path() 102 *name = buf; in d_namespace_path() 110 error = prepend(name, *name - buf, "/proc", 5); in d_namespace_path() 136 *name = buf; in d_namespace_path() 143 *name = buf; in d_namespace_path() 149 *name = res; in d_namespace_path() 171 if (!error && isdir && ((*name)[1] != '\0' || (*name)[0] != '/')) in d_namespace_path() [all …]
|
| A D | lib.c | 51 const char *name, size_t len) in val_table_find_ent() argument 189 if (!name) in aa_splitn_fqname() 192 if (name[0] == ':') { in aa_splitn_fqname() 193 char *split = strnchr(&name[1], end - &name[1], ':'); in aa_splitn_fqname() 194 *ns_name = skipn_spaces(&name[1], end - &name[1]); in aa_splitn_fqname() 207 name = NULL; in aa_splitn_fqname() 211 if (name && *name == 0) in aa_splitn_fqname() 212 name = NULL; in aa_splitn_fqname() 214 return name; in aa_splitn_fqname() 241 return str->name; in aa_str_alloc() [all …]
|
| A D | policy_ns.c | 83 static struct aa_profile *alloc_unconfined(const char *name) in alloc_unconfined() argument 87 profile = aa_alloc_null(NULL, name, GFP_KERNEL); in alloc_unconfined() 113 if (!aa_policy_init(&ns->base, prefix, name, GFP_KERNEL)) in alloc_ns() 210 ns = aa_get_ns(__aa_lookupn_ns(view, name, n)); in aa_lookupn_ns() 223 AA_BUG(!name); in __aa_create_ns() 226 ns = alloc_ns(parent->base.hname, name); in __aa_create_ns() 234 ns->base.name); in __aa_create_ns() 265 ns = aa_get_ns(__aa_find_ns(&parent->sub_ns, name)); in __aa_find_or_create_ns() 267 ns = __aa_create_ns(parent, name, dir); in __aa_find_or_create_ns() 289 ns = aa_get_ns(__aa_find_ns(&parent->sub_ns, name)); in aa_prepare_ns() [all …]
|
| A D | procattr.c | 79 char *name; in split_token_from_name() local 81 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 82 if ((name == args) || *name != '^') { in split_token_from_name() 87 name++; /* skip ^ */ in split_token_from_name() 88 if (!*name) in split_token_from_name() 89 name = NULL; in split_token_from_name() 90 return name; in split_token_from_name()
|
| A D | policy.c | 440 return __strn_find_child(head, name, strlen(name)); in __find_child() 531 if (!name) in __create_missing_ancestors() 633 if (name) in aa_fqlookupn_profile() 706 if (name) { in aa_new_learning_profile() 708 goto name; in aa_new_learning_profile() 714 if (!name) in aa_new_learning_profile() 719 name: in aa_new_learning_profile() 745 kfree(name); in aa_new_learning_profile() 750 kfree(name); in aa_new_learning_profile() 808 ad.name = name; in audit_policy() [all …]
|
| A D | policy_unpack.c | 44 if (ad->name) { in audit_cb() 75 ad.name = name; in audit_iface() 239 if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag))) in aa_unpack_nameX() 241 } else if (name) { in aa_unpack_nameX() 865 if (*name == '\0') in unpack_profile() 868 tmpname = aa_splitn_fqname(name, strlen(name), &tmpns, &ns_len); in unpack_profile() 880 name = tmpname; in unpack_profile() 1147 name = NULL; in unpack_profile() 1148 else if (!name) in unpack_profile() 1149 name = "unknown"; in unpack_profile() [all …]
|
| A D | domain.c | 397 AA_BUG(!name); in find_attach() 427 name, &count); in find_attach() 479 } else if (!strcmp(profile->base.name, name)) { in find_attach() 526 AA_BUG(!name); in x_table_lookup() 535 *name = next; in x_table_lookup() 601 name, info); in x_to_label() 605 name, info); in x_to_label() 773 name); in profile_transition() 1125 name = hats[i]; in change_hat() 1161 name = NULL; in change_hat() [all …]
|
| /security/selinux/ |
| A D | genheaders.c | 11 const char *name; member 62 for (i = 0; secclass_map[i].name; i++) { in main() 63 char *name = stoupperx(secclass_map[i].name); in main() local 66 free(name); in main() 89 char *name = stoupperx(secclass_map[i].name); in main() local 91 len = strlen(name); in main() 95 free(name); in main() 126 char *name = stoupperx(map->name); in main() local 128 len = strlen(name); in main() 134 map->name, map->perms[j]); in main() [all …]
|
| /security/tomoyo/ |
| A D | realpath.c | 191 char name[64]; in tomoyo_get_local_path() local 195 name[sizeof(name) - 1] = '\0'; in tomoyo_get_local_path() 196 snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev), in tomoyo_get_local_path() 198 name_len = strlen(name); in tomoyo_get_local_path() 202 memmove(pos, name, name_len); in tomoyo_get_local_path() 208 const char *name = sb->s_type->name; in tomoyo_get_local_path() local 214 memmove(pos, name, name_len); in tomoyo_get_local_path() 240 char *name = NULL; in tomoyo_realpath_from_path() local 283 name = tomoyo_encode(pos); in tomoyo_realpath_from_path() 287 if (!name) in tomoyo_realpath_from_path() [all …]
|
| A D | domain.c | 208 return name; in tomoyo_last_word() 444 if (strncmp(name, ns->name, len) || in tomoyo_find_namespace() 445 (name[len] && name[len] != ' ')) in tomoyo_find_namespace() 485 name[len] = '\0'; in tomoyo_assign_namespace() 486 entry->name = name; in tomoyo_assign_namespace() 731 if (exename.name && !strncmp(exename.name, "proc:/", 6)) { in tomoyo_find_next_domain() 735 if (!exename.name) { in tomoyo_find_next_domain() 737 if (!exename.name) in tomoyo_find_next_domain() 818 candidate->name); in tomoyo_find_next_domain() 829 old_domain->ns->name, candidate->name); in tomoyo_find_next_domain() [all …]
|
| A D | file.c | 152 if (buf->name) { in tomoyo_get_realpath() 285 &acl->name); in tomoyo_check_path_number_acl() 330 &acl->name); in tomoyo_check_mkdev_acl() 347 return tomoyo_same_name_union(&p1->name, &p2->name); in tomoyo_same_path_acl() 419 return tomoyo_same_name_union(&p1->name, &p2->name) && in tomoyo_same_mkdev_acl() 639 return tomoyo_same_name_union(&p1->name, &p2->name) && in tomoyo_same_path_number_acl() 736 kfree(buf.name); in tomoyo_path_number_perm() 765 buf.name = NULL; in tomoyo_check_open_permission() 786 kfree(buf.name); in tomoyo_check_open_permission() 820 buf.name = NULL; in tomoyo_path_perm() [all …]
|
| A D | memory.c | 152 const struct tomoyo_path_info *tomoyo_get_name(const char *name) in tomoyo_get_name() argument 159 if (!name) in tomoyo_get_name() 161 len = strlen(name) + 1; in tomoyo_get_name() 162 hash = full_name_hash(NULL, (const unsigned char *) name, len - 1); in tomoyo_get_name() 167 if (hash != ptr->entry.hash || strcmp(name, ptr->entry.name) || in tomoyo_get_name() 175 ptr->entry.name = ((char *) ptr) + sizeof(*ptr); in tomoyo_get_name() 176 memmove((char *) ptr->entry.name, name, len); in tomoyo_get_name() 201 tomoyo_kernel_namespace.name = "<kernel>"; in tomoyo_mm_init()
|
| A D | securityfs_if.c | 55 struct tomoyo_path_info name; in tomoyo_write_self() local 58 name.name = data; in tomoyo_write_self() 59 tomoyo_fill_path_info(&name); in tomoyo_write_self() 63 r.param.task.domainname = &name; in tomoyo_write_self() 103 const char *domain = tomoyo_domain()->domainname->name; in tomoyo_read_self() 224 static void __init tomoyo_create_entry(const char *name, const umode_t mode, in tomoyo_create_entry() argument 227 securityfs_create_file(name, mode, parent, (void *) (uintptr_t) key, in tomoyo_create_entry()
|
| A D | environ.c | 24 return tomoyo_path_matches_pattern(r->param.environ.name, acl->env); in tomoyo_check_env_acl() 37 r->param.environ.name->name); in tomoyo_audit_env_log() 57 environ.name = env; in tomoyo_env_perm() 60 r->param.environ.name = &environ; in tomoyo_env_perm()
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 145 size += strlen(xattr->name) + 1; in evm_read_xattrs() 159 offset += strlen(xattr->name) + 1; in evm_read_xattrs() 210 if (IS_ERR(xattr->name)) { in evm_write_xattrs() 211 err = PTR_ERR(xattr->name); in evm_write_xattrs() 212 xattr->name = NULL; in evm_write_xattrs() 217 len = strlen(xattr->name); in evm_write_xattrs() 218 if (len && xattr->name[len-1] == '\n') in evm_write_xattrs() 219 xattr->name[len-1] = '\0'; in evm_write_xattrs() 224 if (strcmp(xattr->name, ".") == 0) { in evm_write_xattrs() 253 if (strcmp(xattr->name, tmp->name) == 0) { in evm_write_xattrs() [all …]
|
| A D | evm_main.c | 40 .name = XATTR_NAME_SELINUX, 44 .name = XATTR_NAME_SMACK, 48 .name = XATTR_NAME_SMACKEXEC, 56 .name = XATTR_NAME_SMACKMMAP, 60 .name = XATTR_NAME_APPARMOR, 64 .name = XATTR_NAME_IMA, 68 .name = XATTR_NAME_CAPS, 359 xattr->name, NULL, 0); in evm_read_protected_xattrs() 653 const char *name, in evm_inode_set_acl_change() argument 1162 .name = "evm", [all …]
|
| A D | evm_crypto.c | 203 static void dump_security_xattr(const char *name, const char *value, in dump_security_xattr() argument 207 pr_debug("%s: (%zu) [%*phN]\n", name, value_len, in dump_security_xattr() 210 dump_security_xattr_l(name, value, value_len); in dump_security_xattr() 251 if (strcmp(xattr->name, XATTR_NAME_IMA) == 0) in evm_calc_hmac_or_hash() 262 && !strcmp(xattr->name, req_xattr_name)) { in evm_calc_hmac_or_hash() 274 size = vfs_getxattr_alloc(&nop_mnt_idmap, dentry, xattr->name, in evm_calc_hmac_or_hash() 284 xattr->name, NULL, 0); in evm_calc_hmac_or_hash() 287 dentry->d_name.name, xattr->name, size, in evm_calc_hmac_or_hash() 295 dump_security_xattr(xattr->name, xattr_value, xattr_size); in evm_calc_hmac_or_hash() 411 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac() [all …]
|
| /security/integrity/ |
| A D | digsig_asymmetric.c | 25 char name[12]; in request_asymmetric_key() local 27 sprintf(name, "id:%08x", keyid); in request_asymmetric_key() 29 pr_debug("key search: \"%s\"\n", name); in request_asymmetric_key() 36 &key_type_asymmetric, name, true); in request_asymmetric_key() 38 pr_err("Key '%s' is in ima_blacklist_keyring\n", name); in request_asymmetric_key() 48 &key_type_asymmetric, name, true); in request_asymmetric_key() 54 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key() 60 name, keyring->description, in request_asymmetric_key() 64 name, PTR_ERR(key)); in request_asymmetric_key()
|
| /security/ |
| A D | lsm_syscalls.c | 27 u64 lsm_name_to_attr(const char *name) in lsm_name_to_attr() argument 29 if (!strcmp(name, "current")) in lsm_name_to_attr() 31 if (!strcmp(name, "exec")) in lsm_name_to_attr() 33 if (!strcmp(name, "fscreate")) in lsm_name_to_attr() 35 if (!strcmp(name, "keycreate")) in lsm_name_to_attr() 37 if (!strcmp(name, "prev")) in lsm_name_to_attr() 39 if (!strcmp(name, "sockcreate")) in lsm_name_to_attr()
|
| A D | inode.c | 71 .name = "securityfs", 107 static struct dentry *securityfs_create_dentry(const char *name, umode_t mode, in securityfs_create_dentry() argument 120 pr_debug("securityfs: creating file '%s'\n",name); in securityfs_create_dentry() 133 dentry = lookup_noperm(&QSTR(name), parent); in securityfs_create_dentry() 202 struct dentry *securityfs_create_file(const char *name, umode_t mode, in securityfs_create_file() argument 206 return securityfs_create_dentry(name, mode, parent, data, fops, NULL); in securityfs_create_file() 230 struct dentry *securityfs_create_dir(const char *name, struct dentry *parent) in securityfs_create_dir() argument 232 return securityfs_create_file(name, S_IFDIR | 0755, parent, NULL, NULL); in securityfs_create_dir() 262 struct dentry *securityfs_create_symlink(const char *name, in securityfs_create_symlink() argument 275 dent = securityfs_create_dentry(name, S_IFLNK | 0444, parent, in securityfs_create_symlink()
|
| /security/apparmor/include/ |
| A D | policy_ns.h | 91 struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n); 92 struct aa_ns *__aa_find_or_create_ns(struct aa_ns *parent, const char *name, 94 struct aa_ns *aa_prepare_ns(struct aa_ns *root, const char *name); 140 const char *name, size_t n) in __aa_findn_ns() argument 142 return (struct aa_ns *)__policy_strn_find(head, name, n); in __aa_findn_ns() 146 const char *name) in __aa_find_ns() argument 148 return __aa_findn_ns(head, name, strlen(name)); in __aa_find_ns()
|
| A D | policy_unpack.h | 105 char *name; member 172 bool aa_unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name); 173 bool aa_unpack_u32(struct aa_ext *e, u32 *data, const char *name); 174 bool aa_unpack_u64(struct aa_ext *e, u64 *data, const char *name); 175 bool aa_unpack_array(struct aa_ext *e, const char *name, u16 *size); 176 size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name); 177 int aa_unpack_str(struct aa_ext *e, const char **string, const char *name); 178 int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name);
|
| A D | apparmorfs.h | 27 const char *name; member 43 { .name = (_name), .mode = 0444, \ 47 { .name = (_name), .mode = 0444, \ 51 { .name = (_name), .mode = 0444, \ 55 { .name = (_name), .v_type = AA_SFS_TYPE_FOPS, \ 58 { .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) } 113 int __aafs_ns_mkdir(struct aa_ns *ns, struct dentry *parent, const char *name,
|
| /security/integrity/ima/ |
| A D | ima_template.c | 21 {.name = "ima-ng", .fmt = "d-ng|n-ng"}, 22 {.name = "ima-sig", .fmt = "d-ng|n-ng|sig"}, 23 {.name = "ima-ngv2", .fmt = "d-ngv2|n-ng"}, 24 {.name = "ima-sigv2", .fmt = "d-ngv2|n-ng|sig"}, 25 {.name = "ima-buf", .fmt = "d-ng|n-ng|buf"}, 27 {.name = "evm-sig", 170 if ((strcmp(template_desc->name, name) == 0) || in lookup_template_desc() 171 (strcmp(template_desc->fmt, name) == 0)) { in lookup_template_desc() 303 (strlen(template->name) ? in ima_init_template() 319 (strlen(template->name) ? in ima_init_template() [all …]
|
| /security/selinux/ss/ |
| A D | symtab.c | 48 int symtab_insert(struct symtab *s, char *name, void *datum) in symtab_insert() argument 50 return hashtab_insert(&s->table, name, datum, symtab_key_params); in symtab_insert() 53 void *symtab_search(struct symtab *s, const char *name) in symtab_search() argument 55 return hashtab_search(&s->table, name, symtab_key_params); in symtab_search()
|