Searched refs:args (Results 1 - 16 of 16) sorted by relevance

/security/apparmor/include/
H A Dprocattr.h22 int aa_setprocattr_changehat(char *args, size_t size, int test);
H A Dapparmor.h50 #define AA_DEBUG(fmt, args...) \
53 printk(KERN_DEBUG "AppArmor: " fmt, ##args); \
56 #define AA_ERROR(fmt, args...) \
59 printk(KERN_ERR "AppArmor: " fmt, ##args); \
66 char *aa_split_fqname(char *args, char **ns_name);
/security/apparmor/
H A Dprocattr.c85 * @args: string to parse (NOT NULL)
90 static char *split_token_from_name(int op, char *args, u64 * token) argument
94 *token = simple_strtoull(args, &name, 16);
95 if ((name == args) || *name != '^') {
96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args);
108 * @args: args received from writing to /proc/<pid>/attr/current (NOT NULL)
109 * @size: size of the args
114 int aa_setprocattr_changehat(char *args, size_t size, int test) argument
121 hat = split_token_from_name(OP_CHANGE_HAT, args,
[all...]
H A Dlsm.c536 char *command, *args = value; local
542 /* args points to a PAGE_SIZE buffer, AppArmor requires that
546 if (args[size - 1] != '\0') {
549 args[size] = '\0';
556 args = value;
557 args = strim(args);
558 command = strsep(&args, " ");
559 if (!args)
561 args
[all...]
/security/integrity/ima/
H A Dima_policy.c409 substring_t *args, int lsm_rule, int audit_type)
416 entry->lsm[lsm_rule].args_p = match_strdup(args);
452 substring_t args[MAX_OPT_ARGS]; local
460 token = match_token(p, policy_tokens, args);
503 ima_log_string(ab, "func", args[0].from);
508 if (strcmp(args[0].from, "FILE_CHECK") == 0)
511 else if (strcmp(args[0].from, "PATH_CHECK") == 0)
513 else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
515 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
517 else if ((strcmp(args[
408 ima_lsm_rule_init(struct ima_rule_entry *entry, substring_t *args, int lsm_rule, int audit_type) argument
[all...]
/security/selinux/ss/
H A Dhashtab.h70 * Applies the specified apply function to (key,datum,args)
81 int (*apply)(void *k, void *d, void *args),
82 void *args);
H A Dsidtab.h42 void *args),
43 void *args);
H A Dhashtab.c121 int (*apply)(void *k, void *d, void *args),
122 void *args)
134 ret = apply(cur->key, cur->datum, args);
120 hashtab_map(struct hashtab *h, int (*apply)(void *k, void *d, void *args), void *args) argument
H A Dservices.c450 static int dump_masked_av_helper(void *k, void *d, void *args) argument
453 char **permission_names = args;
1842 struct convert_context_args *args; local
1856 args = p;
1866 rc = string_to_context_struct(args->newp, NULL, s,
1894 usrdatum = hashtab_search(args->newp->p_users.table,
1895 sym_name(args->oldp, SYM_USERS, c->user - 1));
1902 role = hashtab_search(args->newp->p_roles.table,
1903 sym_name(args->oldp, SYM_ROLES, c->role - 1));
1910 typdatum = hashtab_search(args
2005 struct convert_context_args args; local
2872 get_classes_callback(void *k, void *d, void *args) argument
2911 get_permissions_callback(void *k, void *d, void *args) argument
[all...]
H A Dsidtab.c128 void *args),
129 void *args)
140 rc = apply(cur->sid, &cur->context, args);
125 sidtab_map(struct sidtab *s, int (*apply) (u32 sid, struct context *context, void *args), void *args) argument
/security/tomoyo/
H A Daudit.c232 * @len: Buffer size needed for @fmt and @args.
234 * @args: va_list structure for @fmt.
242 va_list args)
284 vsnprintf(buf + pos, len - pos, fmt, args);
352 * @len: Buffer size needed for @fmt and @args.
354 * @args: va_list structure for @fmt.
359 va_list args)
367 buf = tomoyo_init_log(r, len, fmt, args);
413 va_list args; local
415 va_start(args, fm
241 tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, va_list args) argument
358 tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt, va_list args) argument
[all...]
H A Dcommon.c197 va_list args; local
199 va_start(args, fmt);
200 vsnprintf(buffer + pos, len - pos - 1, fmt, args);
201 va_end(args);
277 va_list args; local
283 va_start(args, fmt);
284 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1;
285 va_end(args);
1997 va_list args; local
2003 va_start(args, fm
[all...]
H A Dcommon.h946 va_list args);
1059 va_list args);
/security/keys/
H A Dtrusted.c733 substring_t args[MAX_OPT_ARGS]; local
743 token = match_token(p, key_tokens, args);
747 opt->pcrinfo_len = strlen(args[0].from) / 2;
750 res = hex2bin(opt->pcrinfo, args[0].from,
756 res = kstrtoul(args[0].from, 16, &handle);
763 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE)
765 res = hex2bin(opt->keyauth, args[0].from,
771 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE)
773 res = hex2bin(opt->blobauth, args[0].from,
779 if (*args[
806 substring_t args[MAX_OPT_ARGS]; local
[all...]
/security/keys/encrypted-keys/
H A Dencrypted.c181 substring_t args[MAX_OPT_ARGS]; local
192 key_cmd = match_token(keyword, key_tokens, args);
201 key_format = match_token(p, key_format_tokens, args);
/security/selinux/
H A Dhooks.c934 substring_t args[MAX_OPT_ARGS]; local
939 token = match_token(p, tokens, args);
948 context = match_strdup(&args[0]);
961 fscontext = match_strdup(&args[0]);
974 rootcontext = match_strdup(&args[0]);
987 defcontext = match_strdup(&args[0]);

Completed in 178 milliseconds