| /security/landlock/ |
| A D | id.c | 23 u64 init; in init_id() 93 u64 id, step; in get_id_range() 131 u64 init; in test_range1_rand0() 145 u64 init; in test_range1_rand1() 159 u64 init; in test_range1_rand15() 173 u64 init; in test_range1_rand16() 187 u64 init; in test_range2_rand0() 201 u64 init; in test_range2_rand1() 215 u64 init; in test_range2_rand2() 229 u64 init; in test_range2_rand15() [all …]
|
| A D | id.h | 15 u64 landlock_get_id_range(size_t number_of_ids);
|
| A D | domain.h | 102 u64 id;
|
| /security/ipe/ |
| A D | policy.c | 30 static inline u64 ver_to_u64(const struct ipe_policy *const p) in ver_to_u64() 32 u64 r; in ver_to_u64() 34 r = (((u64)p->parsed->version.major) << 32) in ver_to_u64() 35 | (((u64)p->parsed->version.minor) << 16) in ver_to_u64() 36 | ((u64)(p->parsed->version.rev)); in ver_to_u64()
|
| /security/apparmor/include/ |
| A D | task.h | 29 u64 token; 34 int aa_set_current_hat(struct aa_label *label, u64 token); 35 int aa_restore_previous_label(u64 cookie);
|
| A D | apparmorfs.h | 34 unsigned long u64; member 52 .v_type = AA_SFS_TYPE_U64, .v.u64 = (_value), \
|
| A D | domain.h | 30 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
|
| A D | policy_unpack.h | 174 bool aa_unpack_u64(struct aa_ext *e, u64 *data, const char *name);
|
| A D | label.h | 136 u64 mediates; 251 return (L)->mediates & (((u64) 1) << (C)); in label_mediates()
|
| /security/selinux/include/ |
| A D | ibpkey.h | 22 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid); 28 static inline int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid) in sel_ib_pkey_sid()
|
| A D | objsec.h | 160 u64 subnet_prefix; /* Port subnet prefix */
|
| /security/apparmor/ |
| A D | capability.c | 37 u64 ktime_ns_expiration[CAP_LAST_CAP+1]; 70 const u64 AUDIT_CACHE_TIMEOUT_NS = 1000*1000*1000; /* 1 second */ in audit_caps() 212 caps.val |= ((u64)(perms.allow)) << (i * 5); in aa_profile_capget() 213 caps.val |= ((u64)(perms.complain)) << (i * 5); in aa_profile_capget()
|
| A D | procattr.c | 77 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() 104 u64 token; in aa_setprocattr_changehat()
|
| A D | policy_unpack_test.c | 30 #define TEST_U64_DATA ((u64)0x0102030405060708) 38 #define TEST_NAMED_BLOB_BUF_OFFSET (TEST_U64_BUF_OFFSET + sizeof(u64) + 1) 498 u64 data = 0; in policy_unpack_test_unpack_u64_with_null_name() 507 puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64) + 1); in policy_unpack_test_unpack_u64_with_null_name() 515 u64 data = 0; in policy_unpack_test_unpack_u64_with_name() 524 puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64) + 1); in policy_unpack_test_unpack_u64_with_name() 532 u64 data = 0; in policy_unpack_test_unpack_u64_out_of_bounds() 535 puf->e->end = puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64); in policy_unpack_test_unpack_u64_out_of_bounds()
|
| A D | task.c | 117 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() 157 int aa_restore_previous_label(u64 token) in aa_restore_previous_label()
|
| A D | policy_unpack.c | 293 VISIBLE_IF_KUNIT bool aa_unpack_u64(struct aa_ext *e, u64 *data, const char *name) in aa_unpack_u64() 298 if (!aa_inbounds(e, sizeof(u64))) in aa_unpack_u64() 302 e->pos += sizeof(u64); in aa_unpack_u64() 328 data->val = (u32)data->val | ((u64)val << 32); in aa_unpack_cap_high() 629 u64 tmp2 = 0; in unpack_rlimits()
|
| /security/selinux/ss/ |
| A D | ebitmap.c | 24 #define BITS_PER_U64 ((u32)(sizeof(u64) * 8)) 368 u64 map; in ebitmap_read() 446 rc = next_entry(&mapbits, fp, sizeof(u64)); in ebitmap_read() 486 u64 map; in ebitmap_write() 521 map = (u64)1 << (bit - last_startbit); in ebitmap_write() 532 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write() 540 map |= (u64)1 << (bit - last_startbit); in ebitmap_write() 553 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write()
|
| A D | hashtab.c | 111 u64 chain2_len_sum; in hashtab_stat() 130 chain2_len_sum += (u64)chain_len * chain_len; in hashtab_stat()
|
| A D | hashtab.h | 41 u64 chain2_len_sum;
|
| /security/integrity/platform_certs/ |
| A D | load_powerpc.c | 29 static __init void *get_cert_list(u8 *key, unsigned long keylen, u64 *size) in get_cert_list() 64 u64 dsize = 0; in load_powerpc_certs() 65 u64 offset = 0; in load_powerpc_certs()
|
| /security/selinux/ |
| A D | ibpkey.c | 70 static struct sel_ib_pkey *sel_ib_pkey_find(u64 subnet_prefix, u16 pkey_num) in sel_ib_pkey_find() 129 static int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid_slow() 180 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid()
|
| /security/ |
| A D | lsm_syscalls.c | 27 u64 lsm_name_to_attr(const char *name) in lsm_name_to_attr() 96 SYSCALL_DEFINE3(lsm_list_modules, u64 __user *, ids, u32 __user *, size, in SYSCALL_DEFINE3()
|
| /security/keys/ |
| A D | keyring.c | 153 static u64 mult_64x32_and_fold(u64 x, u32 y) in mult_64x32_and_fold() 155 u64 hi = (u64)(u32)(x >> 32) * y; in mult_64x32_and_fold() 156 u64 lo = (u64)(u32)(x) * y; in mult_64x32_and_fold() 157 return lo + ((u64)(u32)hi << 32) + (u32)(hi >> 32); in mult_64x32_and_fold() 170 u64 acc; in hash_key_type_and_desc()
|
| /security/integrity/ima/ |
| A D | ima.h | 126 u64 buffer_size; 127 u64 count;
|
| A D | ima_template_lib.c | 126 case sizeof(u64): in ima_show_template_data_ascii() 131 seq_printf(m, "%llu", *(u64 *)buf_ptr); in ima_show_template_data_ascii()
|