Searched defs:value (Results 1 - 18 of 18) sorted by relevance

/security/apparmor/
H A Dresource.c37 audit_log_format(ab, " rlimit=%s value=%lu",
45 * @value: value being set
46 * @error: error value
51 unsigned long value, int error)
60 aad.rlim.max = value;
50 audit_resource(struct aa_profile *profile, unsigned int resource, unsigned long value, int error) argument
H A Dlsm.c505 char **value)
523 error = aa_getprocattr(profile, value);
532 void *value, size_t size)
536 char *command, *args = value;
556 args = value;
565 arg_size = size - (args - (char *) value);
504 apparmor_getprocattr(struct task_struct *task, char *name, char **value) argument
531 apparmor_setprocattr(struct task_struct *task, char *name, void *value, size_t size) argument
/security/keys/
H A Dtrusted.h111 static inline void store8(struct tpm_buf *buf, const unsigned char value) argument
113 buf->data[buf->len++] = value;
116 static inline void store16(struct tpm_buf *buf, const uint16_t value) argument
118 *(uint16_t *) & buf->data[buf->len] = htons(value);
119 buf->len += sizeof value;
122 static inline void store32(struct tpm_buf *buf, const uint32_t value) argument
124 *(uint32_t *) & buf->data[buf->len] = htonl(value);
125 buf->len += sizeof value;
/security/selinux/ss/
H A Debitmap.c250 int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value) argument
258 if (value) {
293 if (!value)
H A Dpolicydb.h46 u32 value; /* permission bit + 1 */ member in struct:perm_datum
51 u32 value; /* internal common value */ member in struct:common_datum
57 u32 value; /* class value */ member in struct:class_datum
81 u32 value; /* internal role value */ member in struct:role_datum
114 u32 value; /* internal type value */ member in struct:type_datum
122 u32 value; /* interna member in struct:user_datum
138 u32 value; /* internal category bit + 1 */ member in struct:cat_datum
150 __u32 value; /* internal type value */ member in struct:cond_bool_datum
[all...]
H A Dservices.c102 u16 value; /* policy value */ member in struct:selinux_mapping
145 p_out->value = string_to_security_class(pol, p_in->name);
146 if (!p_out->value) {
164 p_out->perms[k] = string_to_av_perm(pol, p_out->value,
199 return current_mapping[tclass].value;
205 * Get kernel value for class from its policy value
212 if (current_mapping[i].value == pol_value)
262 * Return the boolean value o
2876 int value = datum->value - 1; local
2915 int value = datum->value - 1; local
[all...]
/security/tomoyo/
H A Dcondition.c37 result = tomoyo_path_matches_pattern(&arg, argv->value);
50 * @env_value: The value of environment variable.
63 struct tomoyo_path_info value; local
66 value.name = env_value;
67 tomoyo_fill_path_info(&value);
73 if (envp->value) {
74 result = tomoyo_path_matches_pattern(&value,
75 envp->value);
204 if ((!envp->value && !envp->is_not) ||
205 (envp->value
310 const struct tomoyo_path_info *value; local
813 unsigned long value = 0; local
[all...]
H A Dfile.c104 * tomoyo_compare_number_union - Check whether a value matches "struct tomoyo_number_union" or not.
106 * @value: Number to check.
109 * Returns true if @value matches @ptr, false otherwise.
111 bool tomoyo_compare_number_union(const unsigned long value, argument
115 return tomoyo_number_matches_group(value, value, ptr->group);
116 return value >= ptr->values[0] && value <= ptr->values[1];
163 * Returns 0 on success, negative value otherwise.
177 * Returns 0 on success, negative value otherwis
[all...]
H A Dutil.c187 * tomoyo_parse_ulong - Parse an "unsigned long" value.
194 * The @src is updated to point the first character after the value
227 * tomoyo_print_ulong - Print an "unsigned long" value.
231 * @value: An "unsigned long" value.
232 * @type: Type of @value.
237 const unsigned long value, const u8 type)
240 snprintf(buffer, buffer_len, "%lu", value);
242 snprintf(buffer, buffer_len, "0%lo", value);
244 snprintf(buffer, buffer_len, "0x%lX", value);
236 tomoyo_print_ulong(char *buffer, const int buffer_len, const unsigned long value, const u8 type) argument
[all...]
H A Dcommon.c179 * @value: Bool value.
181 const char *tomoyo_yesno(const unsigned int value) argument
183 return value ? "yes" : "no";
559 * tomoyo_set_uint - Set value for specified preference.
579 * @value: Mode for @name.
582 * Returns 0 on success, negative value otherwise.
584 static int tomoyo_set_mode(char *name, const char *value, argument
616 if (strstr(value, "use_default")) {
621 if (strstr(value, tomoyo_mod
[all...]
H A Dcommon.h377 * We must choose a positive value in order to distinguish "granted" (which is
378 * 0) and "rejected" (which is a negative value) and "retry".
605 const struct tomoyo_path_info *value; member in struct:tomoyo_argv
612 const struct tomoyo_path_info *value; member in struct:tomoyo_envp
918 bool tomoyo_compare_number_union(const unsigned long value,
951 const char *tomoyo_yesno(const unsigned int value);
1050 const unsigned long value, const u8 type);
/security/
H A Dcommoncap.c624 * @value: The value that the xattr will be changed to
625 * @size: The size of value
635 const void *value, size_t size, int flags)
825 * @nice: The nice value to set
634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
H A Dcapability.c153 void **value, size_t *len)
231 const void *value, size_t size, int flags)
252 const void *value, size_t size, int flags)
850 static int cap_getprocattr(struct task_struct *p, char *name, char **value) argument
855 static int cap_setprocattr(struct task_struct *p, char *name, void *value, argument
151 cap_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument
230 cap_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
251 cap_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
H A Dsecurity.c114 * value passed to this function. You'll need to check first if your LSM
378 &lsm_xattr->value,
389 for (xattr = new_xattrs; xattr->value != NULL; xattr++)
390 kfree(xattr->value);
397 void **value, size_t *len)
401 return security_ops->inode_init_security(inode, dir, qstr, name, value,
616 const void *value, size_t size, int flags)
622 ret = security_ops->inode_setxattr(dentry, name, value, size, flags);
625 ret = ima_inode_setxattr(dentry, name, value, size);
628 return evm_inode_setxattr(dentry, name, value, siz
395 security_old_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument
615 security_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
631 security_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
686 security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
1096 security_getprocattr(struct task_struct *p, char *name, char **value) argument
1101 security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument
[all...]
/security/integrity/ima/
H A Dima_policy.c57 void *args_p; /* audit value */
433 static void ima_log_string(struct audit_buffer *ab, char *key, char *value) argument
436 audit_log_untrustedstring(ab, value);
/security/selinux/
H A Dselinuxfs.c1590 int value; local
1595 value = security_policycap_supported(i_ino & SEL_INO_MASK);
1596 length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
H A Dhooks.c2758 void **value, size_t *len)
2804 if (value && len) {
2808 *value = context;
2989 const void *value, size_t size, int flags)
3016 rc = security_context_to_sid(value, size, &newsid, GFP_KERNEL);
3025 if (value) {
3026 str = value;
3037 audit_log_n_untrustedstring(ab, value, audit_size);
3042 rc = security_context_to_sid_force(value, size, &newsid);
3065 const void *value, size_
2755 selinux_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument
2988 selinux_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
3064 selinux_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
3160 selinux_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
5603 selinux_getprocattr(struct task_struct *p, char *name, char **value) argument
5649 selinux_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument
[all...]
/security/smack/
H A Dsmack_lsm.c780 * @value: where to put the attribute value
787 void **value, size_t *len)
798 if (value) {
816 *value = kstrdup(isp->smk_known, GFP_NOFS);
817 if (*value == NULL)
1048 * @value: value of the attribute
1049 * @size: size of the value
1057 const void *value, size_
785 smack_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument
1056 smack_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
1119 smack_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
2376 smack_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
3200 smack_getprocattr(struct task_struct *p, char *name, char **value) argument
3230 smack_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument
[all...]

Completed in 4466 milliseconds