| /security/tomoyo/ |
| A D | mount.c | 35 r->param.mount.type->name, in tomoyo_audit_mount_log() 55 tomoyo_compare_name_union(r->param.mount.type, in tomoyo_check_mount_acl() 97 requested_type = tomoyo_encode(type); in tomoyo_mount_acl() 125 fstype = get_fs_type(type); in tomoyo_mount_acl() 162 r->param.mount.type = &rtype; in tomoyo_mount_acl() 192 const char *type, unsigned long flags, in tomoyo_mount_permission() argument 205 type = tomoyo_mounts[TOMOYO_MOUNT_REMOUNT]; in tomoyo_mount_permission() 208 type = tomoyo_mounts[TOMOYO_MOUNT_BIND]; in tomoyo_mount_permission() 231 type = tomoyo_mounts[TOMOYO_MOUNT_MOVE]; in tomoyo_mount_permission() 234 if (!type) in tomoyo_mount_permission() [all …]
|
| A D | network.c | 286 u8 type; in tomoyo_write_inet_network() local 293 for (type = 0; type < TOMOYO_MAX_NETWORK_OPERATION; type++) in tomoyo_write_inet_network() 331 u8 type; in tomoyo_write_unix_network() local 338 for (type = 0; type < TOMOYO_MAX_NETWORK_OPERATION; type++) in tomoyo_write_unix_network() 474 if (type && tomoyo_init_request_info(&r, NULL, type) in tomoyo_inet_entry() 551 if (type && tomoyo_init_request_info(&r, NULL, type) in tomoyo_unix_entry() 654 const unsigned int type = sock->type; in tomoyo_socket_listen_permission() local 691 const unsigned int type = sock->type; in tomoyo_socket_connect_permission() local 728 const unsigned int type = sock->type; in tomoyo_socket_bind_permission() local 763 const unsigned int type = sock->type; in tomoyo_socket_sendmsg_permission() local [all …]
|
| A D | file.c | 218 switch (type) { in tomoyo_audit_path_number_log() 236 [tomoyo_pn2mac[type]], in tomoyo_audit_path_number_log() 1015 u8 type; in tomoyo_write_file() local 1018 for (type = 0; type < TOMOYO_MAX_PATH_OPERATION; type++) in tomoyo_write_file() 1020 perm |= 1 << type; in tomoyo_write_file() 1023 for (type = 0; type < TOMOYO_MAX_PATH2_OPERATION; type++) in tomoyo_write_file() 1026 perm |= 1 << type; in tomoyo_write_file() 1029 for (type = 0; type < TOMOYO_MAX_PATH_NUMBER_OPERATION; type++) in tomoyo_write_file() 1032 perm |= 1 << type; in tomoyo_write_file() 1035 for (type = 0; type < TOMOYO_MAX_MKDEV_OPERATION; type++) in tomoyo_write_file() [all …]
|
| A D | domain.c | 76 return a->type == b->type && a->cond == b->cond; in tomoyo_same_acl_head() 229 return p1->type == p2->type && p1->is_last_name == p2->is_last_name in tomoyo_same_transition_control() 243 const u8 type) in tomoyo_write_transition_control() argument 245 struct tomoyo_transition_control e = { .type = type }; in tomoyo_write_transition_control() 306 if (ptr->head.is_deleted || ptr->type != type) in tomoyo_scan_transition() 356 last_name, type)) { in tomoyo_transition_type() 357 type++; in tomoyo_transition_type() 368 type++; in tomoyo_transition_type() 369 type++; in tomoyo_transition_type() 371 return type; in tomoyo_transition_type() [all …]
|
| A D | util.c | 229 if (type == TOMOYO_VALUE_TYPE_DECIMAL) in tomoyo_print_ulong() 231 else if (type == TOMOYO_VALUE_TYPE_OCTAL) in tomoyo_print_ulong() 276 u8 type; in tomoyo_parse_number_union() local 286 type = tomoyo_parse_ulong(&v, &data); in tomoyo_parse_number_union() 287 if (type == TOMOYO_VALUE_TYPE_INVALID) in tomoyo_parse_number_union() 290 ptr->value_type[0] = type; in tomoyo_parse_number_union() 293 ptr->value_type[1] = type; in tomoyo_parse_number_union() 298 type = tomoyo_parse_ulong(&v, &data); in tomoyo_parse_number_union() 302 ptr->value_type[1] = type; in tomoyo_parse_number_union() 1030 r->type = index; in tomoyo_init_request_info() [all …]
|
| A D | tomoyo.c | 229 int type = TOMOYO_TYPE_CREATE; in tomoyo_path_mknod() local 234 type = TOMOYO_TYPE_MKCHAR; in tomoyo_path_mknod() 237 type = TOMOYO_TYPE_MKBLOCK; in tomoyo_path_mknod() 242 return tomoyo_mkdev_perm(type, &path, perm, dev); in tomoyo_path_mknod() 246 type = TOMOYO_TYPE_MKFIFO; in tomoyo_path_mknod() 249 type = TOMOYO_TYPE_MKSOCK; in tomoyo_path_mknod() 252 return tomoyo_path_number_perm(type, &path, perm); in tomoyo_path_mknod() 413 const char *type, unsigned long flags, void *data) in tomoyo_sb_mount() argument 415 return tomoyo_mount_permission(dev_name, path, type, flags, data); in tomoyo_sb_mount()
|
| /security/apparmor/ |
| A D | audit.c | 98 aa_audit_type[ad->type]); in audit_pre() 151 ad->type = type; in aa_audit_msg() 172 if (type == AUDIT_APPARMOR_AUTO) { in aa_audit() 176 type = AUDIT_APPARMOR_AUDIT; in aa_audit() 178 type = AUDIT_APPARMOR_ALLOWED; in aa_audit() 180 type = AUDIT_APPARMOR_DENIED; in aa_audit() 183 (type == AUDIT_APPARMOR_DENIED && in aa_audit() 188 type = AUDIT_APPARMOR_KILL; in aa_audit() 192 aa_audit_msg(type, ad, cb); in aa_audit() 194 if (ad->type == AUDIT_APPARMOR_KILL) in aa_audit() [all …]
|
| A D | net.c | 125 if (sock_type_names[ad->net.type]) in audit_net_cb() 127 sock_type_names[ad->net.type]); in audit_net_cb() 130 ad->net.type); in audit_net_cb() 225 u32 request, u16 af, int type, int protocol, in aa_match_to_prot() argument 233 state = aa_dfa_match_be16(policy->dfa, state, (u16)type); in aa_match_to_prot() 252 int type, int protocol) in aa_profile_af_perm() argument 259 AA_BUG(type < 0 || type >= SOCK_MAX); in aa_profile_af_perm() 267 state = aa_match_to_prot(rules->policy, state, request, family, type, in aa_profile_af_perm() 273 const char *op, u32 request, u16 family, int type, int protocol) in aa_af_perm() argument 276 DEFINE_AUDIT_NET(ad, op, subj_cred, NULL, family, type, protocol); in aa_af_perm() [all …]
|
| A D | mount.c | 93 if (ad->mnt.type) { in audit_cb() 137 const char *type, const char *trans, in audit_mount() argument 176 ad.mnt.type = type; in audit_mount() 228 const char *type, unsigned long flags, in do_match_mnt() argument 249 if (type) in do_match_mnt() 347 type, NULL, in match_mnt_path_str() 391 type, flags, data, binary, info); in match_mnt() 549 if (type) { in aa_new_mount() 552 fstype = get_fs_type(type); in aa_new_mount() 584 type, flags, data, binary)); in aa_new_mount() [all …]
|
| A D | lib.c | 389 int type, u32 request, struct aa_perms *perms) in aa_profile_match_label() argument 396 type); in aa_profile_match_label() 422 int type, error; in aa_check_perms() local 431 type = AUDIT_APPARMOR_AUDIT; in aa_check_perms() 437 type = AUDIT_APPARMOR_KILL; in aa_check_perms() 439 type = AUDIT_APPARMOR_ALLOWED; in aa_check_perms() 441 type = AUDIT_APPARMOR_DENIED; in aa_check_perms() 456 aa_audit_msg(type, ad, cb); in aa_check_perms() 459 if (type == AUDIT_APPARMOR_ALLOWED) in aa_check_perms()
|
| /security/ |
| A D | device_cgroup.c | 37 short type; member 111 if (walk->type != ex->type) in dev_exception_add() 139 if (walk->type != ex->type) in dev_exception_rm() 264 if (type == DEVCG_DEV_ALL) in type_to_char() 266 if (type == DEVCG_DEV_CHAR) in type_to_char() 333 if ((type & DEVCG_DEV_BLOCK) && !(ex->type & DEVCG_DEV_BLOCK)) in match_exception() 335 if ((type & DEVCG_DEV_CHAR) && !(ex->type & DEVCG_DEV_CHAR)) in match_exception() 371 if ((type & DEVCG_DEV_BLOCK) && !(ex->type & DEVCG_DEV_BLOCK)) in match_exception_partial() 373 if ((type & DEVCG_DEV_CHAR) && !(ex->type & DEVCG_DEV_CHAR)) in match_exception_partial() 428 refex->type, in verify_new_ex() [all …]
|
| /security/keys/ |
| A D | key.c | 285 key->index_key.type = type; in key_alloc() 515 if (key->type->preparse) { in key_instantiate_and_link() 547 if (key->type->preparse) in key_instantiate_and_link() 777 if (!key->type->update) in __key_update() 807 const char *type, in __key_create_or_update() argument 828 index_key.type = key_type_lookup(type); in __key_create_or_update() 1051 const char *type, in key_create() argument 1090 if (!key->type->update) in key_update() 1116 if (key->type->preparse) in key_update() 1145 if (key->type->revoke) in key_revoke() [all …]
|
| A D | keyring.c | 47 if (key->type == &key_type_keyring) in keyring_key_to_ptr() 168 unsigned long hash, type; in hash_key_type_and_desc() local 173 type = (unsigned long)index_key->type; in hash_key_type_and_desc() 314 return key->index_key.type == index_key->type && in keyring_compare_object() 351 seg_a = (unsigned long)a->type; in keyring_diff_objects() 584 if (key->type != ctx->index_key.type) { in keyring_search_iterator() 941 struct key_type *type, in keyring_search() argument 946 .index_key.type = type, in keyring_search() 960 if (type->match_preparse) { in keyring_search() 970 if (type->match_free) in keyring_search() [all …]
|
| A D | request_key.c | 244 if (key->type->request_key) in construct_key() 245 actor = key->type->request_key; in construct_key() 389 if (ctx->index_key.type->read) in construct_alloc_key() 392 ctx->index_key.type->update) in construct_alloc_key() 502 if (ctx->index_key.type == &key_type_keyring) in construct_key_and_link() 584 .index_key.type = type, in request_key_and_link() 604 if (type->match_preparse) { in request_key_and_link() 658 if (type->match_free) in request_key_and_link() 659 type->match_free(&ctx.match_data); in request_key_and_link() 787 .index_key.type = type, in request_key_rcu() [all …]
|
| A D | gc.c | 76 if (!(key->type->flags & KEY_TYPE_INSTANT_REAP)) in key_set_expiry() 153 if (state == KEY_IS_POSITIVE && key->type->destroy) in key_gc_unused_keys() 154 key->type->destroy(key); in key_gc_unused_keys() 227 if (key->type == key_gc_dead_keytype) { in key_garbage_collector() 232 } else if (key->type == &key_type_keyring && in key_garbage_collector() 240 if (!(key->type->flags & KEY_TYPE_INSTANT_REAP)) in key_garbage_collector() 250 if (key->type == key_gc_dead_keytype) in key_garbage_collector() 255 if (key->type == &key_type_keyring) in key_garbage_collector() 260 if (key->type == key_gc_dead_keytype) in key_garbage_collector() 368 key->type = &key_type_dead; in key_garbage_collector()
|
| A D | keyctl_pkey.c | 103 if (!params->key->type->asym_query) in keyctl_pkey_params_get() 132 ret = params->key->type->asym_query(params, &info); in keyctl_pkey_params_get_2() 181 ret = params.key->type->asym_query(¶ms, &res); in keyctl_pkey_query() 227 if (!params.key->type->asym_eds_op) in keyctl_pkey_e_d_s() 255 ret = params.key->type->asym_eds_op(¶ms, in, out); in keyctl_pkey_e_d_s() 303 if (!params.key->type->asym_verify_signature) in keyctl_pkey_verify() 319 ret = params.key->type->asym_verify_signature(¶ms, in, in2); in keyctl_pkey_verify()
|
| /security/landlock/ |
| A D | task.c | 112 .type = LANDLOCK_REQUEST_PTRACE, in hook_ptrace_access_check() 114 .type = LSM_AUDIT_DATA_TASK, in hook_ptrace_access_check() 158 .type = LANDLOCK_REQUEST_PTRACE, in hook_ptrace_traceme() 160 .type = LSM_AUDIT_DATA_TASK, in hook_ptrace_traceme() 285 .type = LANDLOCK_REQUEST_SCOPE_ABSTRACT_UNIX_SOCKET, in hook_unix_stream_connect() 287 .type = LSM_AUDIT_DATA_NET, in hook_unix_stream_connect() 324 .type = LSM_AUDIT_DATA_NET, in hook_unix_may_send() 380 .type = LANDLOCK_REQUEST_SCOPE_SIGNAL, in hook_task_kill() 382 .type = LSM_AUDIT_DATA_TASK, in hook_task_kill() 421 .type = LANDLOCK_REQUEST_SCOPE_SIGNAL, in hook_file_send_sigiotask() [all …]
|
| /security/integrity/evm/ |
| A D | evm_crypto.c | 81 if (type == EVM_XATTR_HMAC) { in init_desc() 109 if (type == EVM_XATTR_HMAC) { in init_desc() 143 char type, char *digest) in hmac_add_misc() argument 157 if (type != EVM_XATTR_PORTABLE_DIGSIG) { in hmac_add_misc() 174 type != EVM_XATTR_PORTABLE_DIGSIG) in hmac_add_misc() 224 uint8_t type, struct evm_digest *data, in evm_calc_hmac_or_hash() argument 241 desc = init_desc(type, data->hdr.algo); in evm_calc_hmac_or_hash() 297 hmac_add_misc(desc, inode, type, data->digest); in evm_calc_hmac_or_hash() 329 req_xattr_value_len, type, data, iint); in evm_calc_hash() 350 if (xattr_data->type == EVM_XATTR_PORTABLE_DIGSIG) in evm_is_immutable() [all …]
|
| /security/apparmor/include/ |
| A D | audit.h | 113 int type; member 140 int type, protocol; member 157 const char *type; member 179 .common.type = (T), \ 184 void aa_audit_msg(int type, struct apparmor_audit_data *ad, 186 int aa_audit(int type, struct aa_profile *profile,
|
| /security/safesetid/ |
| A D | securityfs.c | 53 if (rule->type == UID){ in parse_policy_line() 58 } else if (rule->type == GID){ in parse_policy_line() 90 if (pol->type == UID) in insert_rule() 92 else if (pol->type == GID) in insert_rule() 106 if (pol->type == UID) { in verify_ruleset() 110 } else if (pol->type == GID) { in verify_ruleset() 124 if (pol->type == UID){ in verify_ruleset() 127 nrule->type = UID; in verify_ruleset() 131 nrule->type = GID; in verify_ruleset() 153 pol->type = policy_type; in handle_policy_update() [all …]
|
| /security/integrity/ |
| A D | integrity.h | 36 u8 type; 59 u8 type; 62 u8 type; 93 uint8_t type; /* xattr type */ member 216 integrity_audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type) in integrity_audit_log_start() argument 218 return audit_log_start(ctx, gfp_mask, type); in integrity_audit_log_start() 238 integrity_audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type) in integrity_audit_log_start() argument
|
| /security/ipe/ |
| A D | hooks.c | 238 int ipe_bdev_setintegrity(struct block_device *bdev, enum lsm_integrity_type type, in ipe_bdev_setintegrity() argument 245 if (type == LSM_INT_DMVERITY_SIG_VALID) { in ipe_bdev_setintegrity() 251 if (type != LSM_INT_DMVERITY_ROOTHASH) in ipe_bdev_setintegrity() 302 enum lsm_integrity_type type, in ipe_inode_setintegrity() argument 307 if (type == LSM_INT_FSVERITY_BUILTINSIG_VALID) { in ipe_inode_setintegrity()
|
| /security/selinux/ss/ |
| A D | context.h | 31 u32 type; member 162 dst->type = src->type; in context_cpy() 184 c->user = c->role = c->type = 0; in context_destroy() 199 (c1->type == c2->type) && mls_context_equal(c1, c2)); in context_equal()
|
| A D | services.c | 897 if (old_entry->context.type == new_entry->context.type) in security_bounded_transition() 912 if (type->bounds == old_entry->context.type) in security_bounded_transition() 1883 newcontext.type = scontext->type; in security_compute_sid() 1885 newcontext.type = tcontext->type; in security_compute_sid() 1889 newcontext.type = scontext->type; in security_compute_sid() 1892 newcontext.type = tcontext->type; in security_compute_sid() 1907 .type = tcontext->type, in security_compute_sid() 3277 newcon.type = context1->type; in security_sid_mls_copy() 3772 match = (ctxt->type == rule->au_ctxt.type); in selinux_audit_rule_match() 3775 match = (ctxt->type != rule->au_ctxt.type); in selinux_audit_rule_match() [all …]
|
| /security/integrity/ima/ |
| A D | ima_appraise.c | 95 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; in ima_fix_xattr() 98 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG; in ima_fix_xattr() 189 switch (xattr_value->type) { in ima_get_hash_algo() 252 static int calc_file_id_hash(enum evm_ima_xattr_type type, in calc_file_id_hash() argument 260 if (type != IMA_VERITY_DIGSIG) in calc_file_id_hash() 287 switch (xattr_value->type) { in xattr_verify() 306 if (xattr_len - sizeof(xattr_value->type) - hash_start >= in xattr_verify() 601 xattr_value->type != EVM_IMA_XATTR_DIGSIG)) { in ima_appraise_measurement() 787 if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST)) in ima_inode_setxattr() 794 digsig = (xvalue->type == EVM_IMA_XATTR_DIGSIG); in ima_inode_setxattr() [all …]
|