Searched refs:major (Results 1 – 14 of 14) sorted by relevance
| /security/ |
| A D | device_cgroup.c | 36 u32 major, minor; member 113 if (walk->major != ex->major) in dev_exception_add() 141 if (walk->major != ex->major) in dev_exception_rm() 303 set_majmin(maj, ex->major); in devcgroup_seq_show() 337 if (ex->major != ~0 && ex->major != major) in match_exception() 379 if (ex->major != ~0 && major != ~0 && ex->major != major) in match_exception_partial() 429 refex->major, in verify_new_ex() 445 refex->major, refex->minor, in verify_new_ex() 500 ex->major, ex->minor, ex->access); in parent_allows_removal() 683 ex.major = ~0; in devcgroup_update_access() [all …]
|
| A D | security.c | 339 struct lsm_info *major; in ordered_lsm_parse() local 347 for (major = __start_lsm_info; major < __end_lsm_info; in ordered_lsm_parse() 348 major++) { in ordered_lsm_parse() 349 if ((major->flags & LSM_FLAG_LEGACY_MAJOR) && in ordered_lsm_parse() 350 strcmp(major->name, chosen_major_lsm) != 0) { in ordered_lsm_parse() 351 set_enabled(major, false); in ordered_lsm_parse() 353 chosen_major_lsm, major->name); in ordered_lsm_parse()
|
| A D | Kconfig | 237 prompt "First legacy 'major LSM' to be initialized" 250 Selects the legacy "major security module" that will be
|
| /security/keys/encrypted-keys/ |
| A D | ecryptfs_format.c | 31 void ecryptfs_get_versions(int *major, int *minor, int *file_version) in ecryptfs_get_versions() argument 33 *major = ECRYPTFS_VERSION_MAJOR; in ecryptfs_get_versions() 51 int major, minor; in ecryptfs_fill_auth_tok() local 53 ecryptfs_get_versions(&major, &minor, NULL); in ecryptfs_fill_auth_tok() 54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
|
| A D | ecryptfs_format.h | 23 void ecryptfs_get_versions(int *major, int *minor, int *file_version);
|
| /security/tomoyo/ |
| A D | file.c | 201 r->param.mkdev.mode, r->param.mkdev.major, in tomoyo_audit_mkdev_log() 325 tomoyo_compare_number_union(r->param.mkdev.major, in tomoyo_check_mkdev_acl() 326 &acl->major) && in tomoyo_check_mkdev_acl() 421 tomoyo_same_number_union(&p1->major, &p2->major) && in tomoyo_same_mkdev_acl() 473 !tomoyo_parse_number_union(param, &e.major) || in tomoyo_update_mkdev_acl() 482 tomoyo_put_number_union(&e.major); in tomoyo_update_mkdev_acl() 882 r.param.mkdev.major = MAJOR(dev); in tomoyo_mkdev_perm()
|
| A D | common.h | 450 unsigned int major; member 733 struct tomoyo_number_union major; member
|
| A D | gc.c | 192 tomoyo_put_number_union(&entry->major); in tomoyo_del_acl()
|
| A D | common.c | 1491 tomoyo_print_number_union(head, &ptr->major); in tomoyo_print_entry()
|
| /security/ipe/ |
| A D | policy.h | 68 u16 major; member
|
| A D | policy.c | 34 r = (((u64)p->parsed->version.major) << 32) in ver_to_u64()
|
| A D | audit.c | 190 p->parsed->version.major, p->parsed->version.minor, in audit_policy()
|
| A D | policy_fs.c | 184 p->parsed->version.major, p->parsed->version.minor, in read_version()
|
| A D | policy_parser.c | 95 u16 *const cv[] = { &p->version.major, &p->version.minor, &p->version.rev }; in parse_version()
|
Completed in 35 milliseconds