/security/apparmor/ |
H A D | resource.c | 37 audit_log_format(ab, " rlimit=%s value=%lu", 45 * @value: value being set 46 * @error: error value 51 unsigned long value, int error) 60 aad.rlim.max = value; 50 audit_resource(struct aa_profile *profile, unsigned int resource, unsigned long value, int error) argument
|
H A D | lsm.c | 505 char **value) 523 error = aa_getprocattr(profile, value); 532 void *value, size_t size) 536 char *command, *args = value; 556 args = value; 565 arg_size = size - (args - (char *) value); 504 apparmor_getprocattr(struct task_struct *task, char *name, char **value) argument 531 apparmor_setprocattr(struct task_struct *task, char *name, void *value, size_t size) argument
|
/security/keys/ |
H A D | trusted.h | 111 static inline void store8(struct tpm_buf *buf, const unsigned char value) argument 113 buf->data[buf->len++] = value; 116 static inline void store16(struct tpm_buf *buf, const uint16_t value) argument 118 *(uint16_t *) & buf->data[buf->len] = htons(value); 119 buf->len += sizeof value; 122 static inline void store32(struct tpm_buf *buf, const uint32_t value) argument 124 *(uint32_t *) & buf->data[buf->len] = htonl(value); 125 buf->len += sizeof value;
|
/security/selinux/ss/ |
H A D | ebitmap.c | 250 int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value) argument 258 if (value) { 293 if (!value)
|
H A D | policydb.h | 46 u32 value; /* permission bit + 1 */ member in struct:perm_datum 51 u32 value; /* internal common value */ member in struct:common_datum 57 u32 value; /* class value */ member in struct:class_datum 81 u32 value; /* internal role value */ member in struct:role_datum 114 u32 value; /* internal type value */ member in struct:type_datum 122 u32 value; /* interna member in struct:user_datum 138 u32 value; /* internal category bit + 1 */ member in struct:cat_datum 150 __u32 value; /* internal type value */ member in struct:cond_bool_datum [all...] |
H A D | services.c | 102 u16 value; /* policy value */ member in struct:selinux_mapping 145 p_out->value = string_to_security_class(pol, p_in->name); 146 if (!p_out->value) { 164 p_out->perms[k] = string_to_av_perm(pol, p_out->value, 199 return current_mapping[tclass].value; 205 * Get kernel value for class from its policy value 212 if (current_mapping[i].value == pol_value) 262 * Return the boolean value o 2876 int value = datum->value - 1; local 2915 int value = datum->value - 1; local [all...] |
/security/tomoyo/ |
H A D | condition.c | 37 result = tomoyo_path_matches_pattern(&arg, argv->value); 50 * @env_value: The value of environment variable. 63 struct tomoyo_path_info value; local 66 value.name = env_value; 67 tomoyo_fill_path_info(&value); 73 if (envp->value) { 74 result = tomoyo_path_matches_pattern(&value, 75 envp->value); 204 if ((!envp->value && !envp->is_not) || 205 (envp->value 310 const struct tomoyo_path_info *value; local 813 unsigned long value = 0; local [all...] |
H A D | file.c | 104 * tomoyo_compare_number_union - Check whether a value matches "struct tomoyo_number_union" or not. 106 * @value: Number to check. 109 * Returns true if @value matches @ptr, false otherwise. 111 bool tomoyo_compare_number_union(const unsigned long value, argument 115 return tomoyo_number_matches_group(value, value, ptr->group); 116 return value >= ptr->values[0] && value <= ptr->values[1]; 163 * Returns 0 on success, negative value otherwise. 177 * Returns 0 on success, negative value otherwis [all...] |
H A D | util.c | 187 * tomoyo_parse_ulong - Parse an "unsigned long" value. 194 * The @src is updated to point the first character after the value 227 * tomoyo_print_ulong - Print an "unsigned long" value. 231 * @value: An "unsigned long" value. 232 * @type: Type of @value. 237 const unsigned long value, const u8 type) 240 snprintf(buffer, buffer_len, "%lu", value); 242 snprintf(buffer, buffer_len, "0%lo", value); 244 snprintf(buffer, buffer_len, "0x%lX", value); 236 tomoyo_print_ulong(char *buffer, const int buffer_len, const unsigned long value, const u8 type) argument [all...] |
H A D | common.c | 179 * @value: Bool value. 181 const char *tomoyo_yesno(const unsigned int value) argument 183 return value ? "yes" : "no"; 559 * tomoyo_set_uint - Set value for specified preference. 579 * @value: Mode for @name. 582 * Returns 0 on success, negative value otherwise. 584 static int tomoyo_set_mode(char *name, const char *value, argument 616 if (strstr(value, "use_default")) { 621 if (strstr(value, tomoyo_mod [all...] |
H A D | common.h | 377 * We must choose a positive value in order to distinguish "granted" (which is 378 * 0) and "rejected" (which is a negative value) and "retry". 605 const struct tomoyo_path_info *value; member in struct:tomoyo_argv 612 const struct tomoyo_path_info *value; member in struct:tomoyo_envp 918 bool tomoyo_compare_number_union(const unsigned long value, 951 const char *tomoyo_yesno(const unsigned int value); 1050 const unsigned long value, const u8 type);
|
/security/ |
H A D | commoncap.c | 624 * @value: The value that the xattr will be changed to 625 * @size: The size of value 635 const void *value, size_t size, int flags) 825 * @nice: The nice value to set 634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
|
H A D | capability.c | 153 void **value, size_t *len) 231 const void *value, size_t size, int flags) 252 const void *value, size_t size, int flags) 850 static int cap_getprocattr(struct task_struct *p, char *name, char **value) argument 855 static int cap_setprocattr(struct task_struct *p, char *name, void *value, argument 151 cap_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument 230 cap_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 251 cap_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
|
H A D | security.c | 114 * value passed to this function. You'll need to check first if your LSM 378 &lsm_xattr->value, 389 for (xattr = new_xattrs; xattr->value != NULL; xattr++) 390 kfree(xattr->value); 397 void **value, size_t *len) 401 return security_ops->inode_init_security(inode, dir, qstr, name, value, 616 const void *value, size_t size, int flags) 622 ret = security_ops->inode_setxattr(dentry, name, value, size, flags); 625 ret = ima_inode_setxattr(dentry, name, value, size); 628 return evm_inode_setxattr(dentry, name, value, siz 395 security_old_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument 615 security_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 631 security_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 686 security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument 1096 security_getprocattr(struct task_struct *p, char *name, char **value) argument 1101 security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument [all...] |
/security/integrity/ima/ |
H A D | ima_policy.c | 57 void *args_p; /* audit value */ 433 static void ima_log_string(struct audit_buffer *ab, char *key, char *value) argument 436 audit_log_untrustedstring(ab, value);
|
/security/selinux/ |
H A D | selinuxfs.c | 1590 int value; local 1595 value = security_policycap_supported(i_ino & SEL_INO_MASK); 1596 length = scnprintf(tmpbuf, TMPBUFLEN, "%d", value);
|
H A D | hooks.c | 2758 void **value, size_t *len) 2804 if (value && len) { 2808 *value = context; 2989 const void *value, size_t size, int flags) 3016 rc = security_context_to_sid(value, size, &newsid, GFP_KERNEL); 3025 if (value) { 3026 str = value; 3037 audit_log_n_untrustedstring(ab, value, audit_size); 3042 rc = security_context_to_sid_force(value, size, &newsid); 3065 const void *value, size_ 2755 selinux_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument 2988 selinux_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 3064 selinux_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 3160 selinux_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument 5603 selinux_getprocattr(struct task_struct *p, char *name, char **value) argument 5649 selinux_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument [all...] |
/security/smack/ |
H A D | smack_lsm.c | 780 * @value: where to put the attribute value 787 void **value, size_t *len) 798 if (value) { 816 *value = kstrdup(isp->smk_known, GFP_NOFS); 817 if (*value == NULL) 1048 * @value: value of the attribute 1049 * @size: size of the value 1057 const void *value, size_ 785 smack_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const char **name, void **value, size_t *len) argument 1056 smack_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 1119 smack_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 2376 smack_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument 3200 smack_getprocattr(struct task_struct *p, char *name, char **value) argument 3230 smack_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument [all...] |