Searched refs:t (Results 1 – 12 of 12) sorted by relevance
| /security/ipe/ |
| A D | policy_parser.c | 30 struct ipe_op_table *t = NULL; in new_parsed_policy() local 40 t = &p->rules[i]; in new_parsed_policy() 43 INIT_LIST_HEAD(&t->rules); in new_parsed_policy() 146 char *t, *ver = NULL; in parse_header() local 153 if (*t == '\0') in parse_header() 218 struct ipe_prop *p, *t; in free_rule() local 371 char *t; in parse_rule() local 384 if (*t == '\0') in parse_rule() 390 op = parse_operation(t); in parse_rule() 405 action = parse_action(t); in parse_rule() [all …]
|
| /security/apparmor/ |
| A D | lib.c | 124 if (t->size == newsize) in aa_resize_str_table() 130 n[i] = t->table[i]; in aa_resize_str_table() 131 for (; i < t->size; i++) in aa_resize_str_table() 133 if (newsize > t->size) in aa_resize_str_table() 134 memset(&n[t->size], 0, (newsize-t->size)*sizeof(*n)); in aa_resize_str_table() 136 t->table = n; in aa_resize_str_table() 137 t->size = newsize; in aa_resize_str_table() 150 if (t) { in aa_free_str_table() 151 if (!t->table) in aa_free_str_table() 157 t->table = NULL; in aa_free_str_table() [all …]
|
| A D | apparmorfs.c | 110 char *t = target; in mangle_name() local 118 *(t)++ = '.'; in mangle_name() 120 *(t)++ = '_'; in mangle_name() 125 *t = 0; in mangle_name() 840 if (t) in get_multi_transaction() 843 return t; in get_multi_transaction() 848 if (t) in put_multi_transaction() 878 if (!t) in multi_transaction_new() 886 return t; in multi_transaction_new() 899 if (!t) in multi_transaction_read() [all …]
|
| /security/smack/ |
| A D | smack.h | 404 const struct task_struct *t) in smk_of_task_struct_obj() argument 411 cred = __task_cred(t); in smk_of_task_struct_obj() 471 struct task_struct *t) in smk_ad_setfield_u_tsk() argument 473 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 503 struct task_struct *t) in smk_ad_setfield_u_tsk() argument
|
| /security/keys/ |
| A D | request_key.c | 39 struct task_struct *t = current; in cache_requested_key() local 42 if (!(t->flags & PF_KTHREAD)) { in cache_requested_key() 43 key_put(t->cached_requested_key); in cache_requested_key() 44 t->cached_requested_key = key_get(key); in cache_requested_key() 45 set_tsk_thread_flag(t, TIF_NOTIFY_RESUME); in cache_requested_key()
|
| A D | Kconfig | 29 call that didn't upcall to the kernel to be cached temporarily in the
|
| /security/apparmor/include/ |
| A D | lib.h | 128 bool aa_resize_str_table(struct aa_str_table *t, int newsize, gfp_t gfp);
|
| /security/selinux/ss/ |
| A D | policydb.c | 1205 static void type_set_init(struct type_set *t) in type_set_init() argument 1207 ebitmap_init(&t->types); in type_set_init() 1208 ebitmap_init(&t->negset); in type_set_init() 1211 static int type_set_read(struct type_set *t, struct policy_file *fp) in type_set_read() argument 1216 if (ebitmap_read(&t->types, fp)) in type_set_read() 1218 if (ebitmap_read(&t->negset, fp)) in type_set_read() 1224 t->flags = le32_to_cpu(buf[0]); in type_set_read() 3024 static int type_set_write(struct type_set *t, struct policy_file *fp) in type_set_write() argument 3029 if (ebitmap_write(&t->types, fp)) in type_set_write() 3031 if (ebitmap_write(&t->negset, fp)) in type_set_write() [all …]
|
| A D | services.c | 733 char *o = NULL, *n = NULL, *t = NULL; in security_validtrans_handle_fail() local 740 if (sidtab_entry_to_string(p, sidtab, tentry, &t, &tlen)) in security_validtrans_handle_fail() 745 o, n, t, sym_name(p, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail() 749 kfree(t); in security_validtrans_handle_fail() 1694 char *s = NULL, *t = NULL, *n = NULL; in compute_sid_handle_invalid_context() local 1700 if (sidtab_entry_to_string(policydb, sidtab, tentry, &t, &tlen)) in compute_sid_handle_invalid_context() 1712 s, t, sym_name(policydb, SYM_CLASSES, tclass-1)); in compute_sid_handle_invalid_context() 1716 kfree(t); in compute_sid_handle_invalid_context()
|
| /security/tomoyo/ |
| A D | Kconfig | 38 If you don't need audit logs, you may set this value to 0.
|
| /security/ |
| A D | Kconfig | 70 this config can't be enabled universally. 246 in old kernel configs to CONFIG_LSM in new kernel configs. Don't
|
| A D | Kconfig.hardening | 272 # Randstruct was first added in Clang 15, but it isn't safe to use until 292 source tree isn't cleaned after kernel installation).
|
Completed in 30 milliseconds