/security/apparmor/include/ |
H A D | procattr.h | 22 int aa_setprocattr_changehat(char *args, size_t size, int test);
|
H A D | apparmor.h | 50 #define AA_DEBUG(fmt, args...) \ 53 printk(KERN_DEBUG "AppArmor: " fmt, ##args); \ 56 #define AA_ERROR(fmt, args...) \ 59 printk(KERN_ERR "AppArmor: " fmt, ##args); \ 66 char *aa_split_fqname(char *args, char **ns_name);
|
/security/apparmor/ |
H A D | procattr.c | 85 * @args: string to parse (NOT NULL) 90 static char *split_token_from_name(int op, char *args, u64 * token) argument 94 *token = simple_strtoull(args, &name, 16); 95 if ((name == args) || *name != '^') { 96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args); 108 * @args: args received from writing to /proc/<pid>/attr/current (NOT NULL) 109 * @size: size of the args 114 int aa_setprocattr_changehat(char *args, size_t size, int test) argument 121 hat = split_token_from_name(OP_CHANGE_HAT, args, [all...] |
H A D | lsm.c | 536 char *command, *args = value; local 542 /* args points to a PAGE_SIZE buffer, AppArmor requires that 546 if (args[size - 1] != '\0') { 549 args[size] = '\0'; 556 args = value; 557 args = strim(args); 558 command = strsep(&args, " "); 559 if (!args) 561 args [all...] |
/security/integrity/ima/ |
H A D | ima_policy.c | 409 substring_t *args, int lsm_rule, int audit_type) 416 entry->lsm[lsm_rule].args_p = match_strdup(args); 452 substring_t args[MAX_OPT_ARGS]; local 460 token = match_token(p, policy_tokens, args); 503 ima_log_string(ab, "func", args[0].from); 508 if (strcmp(args[0].from, "FILE_CHECK") == 0) 511 else if (strcmp(args[0].from, "PATH_CHECK") == 0) 513 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) 515 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) 517 else if ((strcmp(args[ 408 ima_lsm_rule_init(struct ima_rule_entry *entry, substring_t *args, int lsm_rule, int audit_type) argument [all...] |
/security/selinux/ss/ |
H A D | hashtab.h | 70 * Applies the specified apply function to (key,datum,args) 81 int (*apply)(void *k, void *d, void *args), 82 void *args);
|
H A D | sidtab.h | 42 void *args), 43 void *args);
|
H A D | hashtab.c | 121 int (*apply)(void *k, void *d, void *args), 122 void *args) 134 ret = apply(cur->key, cur->datum, args); 120 hashtab_map(struct hashtab *h, int (*apply)(void *k, void *d, void *args), void *args) argument
|
H A D | services.c | 450 static int dump_masked_av_helper(void *k, void *d, void *args) argument 453 char **permission_names = args; 1842 struct convert_context_args *args; local 1856 args = p; 1866 rc = string_to_context_struct(args->newp, NULL, s, 1894 usrdatum = hashtab_search(args->newp->p_users.table, 1895 sym_name(args->oldp, SYM_USERS, c->user - 1)); 1902 role = hashtab_search(args->newp->p_roles.table, 1903 sym_name(args->oldp, SYM_ROLES, c->role - 1)); 1910 typdatum = hashtab_search(args 2005 struct convert_context_args args; local 2872 get_classes_callback(void *k, void *d, void *args) argument 2911 get_permissions_callback(void *k, void *d, void *args) argument [all...] |
H A D | sidtab.c | 128 void *args), 129 void *args) 140 rc = apply(cur->sid, &cur->context, args); 125 sidtab_map(struct sidtab *s, int (*apply) (u32 sid, struct context *context, void *args), void *args) argument
|
/security/tomoyo/ |
H A D | audit.c | 232 * @len: Buffer size needed for @fmt and @args. 234 * @args: va_list structure for @fmt. 242 va_list args) 284 vsnprintf(buf + pos, len - pos, fmt, args); 352 * @len: Buffer size needed for @fmt and @args. 354 * @args: va_list structure for @fmt. 359 va_list args) 367 buf = tomoyo_init_log(r, len, fmt, args); 413 va_list args; local 415 va_start(args, fm 241 tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt, va_list args) argument 358 tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt, va_list args) argument [all...] |
H A D | common.c | 197 va_list args; local 199 va_start(args, fmt); 200 vsnprintf(buffer + pos, len - pos - 1, fmt, args); 201 va_end(args); 277 va_list args; local 283 va_start(args, fmt); 284 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; 285 va_end(args); 1997 va_list args; local 2003 va_start(args, fm [all...] |
H A D | common.h | 946 va_list args); 1059 va_list args);
|
/security/keys/ |
H A D | trusted.c | 733 substring_t args[MAX_OPT_ARGS]; local 743 token = match_token(p, key_tokens, args); 747 opt->pcrinfo_len = strlen(args[0].from) / 2; 750 res = hex2bin(opt->pcrinfo, args[0].from, 756 res = kstrtoul(args[0].from, 16, &handle); 763 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) 765 res = hex2bin(opt->keyauth, args[0].from, 771 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) 773 res = hex2bin(opt->blobauth, args[0].from, 779 if (*args[ 806 substring_t args[MAX_OPT_ARGS]; local [all...] |
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 181 substring_t args[MAX_OPT_ARGS]; local 192 key_cmd = match_token(keyword, key_tokens, args); 201 key_format = match_token(p, key_format_tokens, args);
|
/security/selinux/ |
H A D | hooks.c | 934 substring_t args[MAX_OPT_ARGS]; local 939 token = match_token(p, tokens, args); 948 context = match_strdup(&args[0]); 961 fscontext = match_strdup(&args[0]); 974 rootcontext = match_strdup(&args[0]); 987 defcontext = match_strdup(&args[0]);
|