Searched refs:val (Results 1 – 13 of 13) sorted by relevance
| /security/selinux/ss/ |
| A D | avtab.c | 346 u32 items, items2, val, i; in avtab_read_item() local 375 val = le32_to_cpu(buf32[items++]); in avtab_read_item() 376 key.source_type = (u16)val; in avtab_read_item() 377 if (key.source_type != val) { in avtab_read_item() 382 key.target_type = (u16)val; in avtab_read_item() 383 if (key.target_type != val) { in avtab_read_item() 388 key.target_class = (u16)val; in avtab_read_item() 389 if (key.target_class != val) { in avtab_read_item() 401 if ((val & AVTAB_AV) && (val & AVTAB_TYPE)) { in avtab_read_item() 405 if (val & AVTAB_XPERMS) { in avtab_read_item() [all …]
|
| /security/selinux/ |
| A D | netlink.c | 50 msg->val = *((int *)data); in selnl_add_payload() 98 void selnl_notify_setenforce(int val) in selnl_notify_setenforce() argument 100 selnl_notify(SELNL_MSG_SETENFORCE, &val); in selnl_notify_setenforce()
|
| A D | hooks.c | 6739 char *val = NULL; in selinux_getselfattr() local 6742 val_len = selinux_lsm_getattr(attr, current, &val); in selinux_getselfattr() 6745 rc = lsm_fill_user_ctx(ctx, size, val, val_len, LSM_ID_SELINUX, 0); in selinux_getselfattr() 6746 kfree(val); in selinux_getselfattr()
|
| /security/apparmor/ |
| A D | lsm.c | 1799 static int param_set_aacompressionlevel(const char *val, 1923 return param_set_bool(val, kp); in param_set_aalockpolicy() 1941 return param_set_bool(val, kp); in param_set_aabool() 1963 error = param_set_uint(val, kp); in param_set_aauint() 1994 error = param_set_bool(val, &kp_local); in param_set_aaintbool() 2029 error = param_set_int(val, kp); in param_set_aacompressionlevel() 2064 if (!val) in param_set_debug() 2069 i = aa_parse_debug_params(val); in param_set_debug() 2092 if (!val) in param_set_audit() 2121 if (!val) in param_set_mode() [all …]
|
| A D | capability.c | 212 caps.val |= ((u64)(perms.allow)) << (i * 5); in aa_profile_capget() 213 caps.val |= ((u64)(perms.complain)) << (i * 5); in aa_profile_capget()
|
| A D | lib.c | 67 int val = 0; in aa_parse_debug_params() local 75 val |= ent->value; in aa_parse_debug_params() 81 return val; in aa_parse_debug_params()
|
| A D | policy_unpack.c | 314 u32 val; in aa_unpack_cap_low() local 316 if (!aa_unpack_u32(e, &val, name)) in aa_unpack_cap_low() 318 data->val = val; in aa_unpack_cap_low() 324 u32 val; in aa_unpack_cap_high() local 326 if (!aa_unpack_u32(e, &val, name)) in aa_unpack_cap_high() 328 data->val = (u32)data->val | ((u64)val << 32); in aa_unpack_cap_high()
|
| /security/ |
| A D | commoncap.c | 634 new->cap_permitted.val = in bprm_caps_from_vfs_caps() 635 (new->cap_bset.val & caps->permitted.val) | in bprm_caps_from_vfs_caps() 636 (new->cap_inheritable.val & caps->inheritable.val); in bprm_caps_from_vfs_caps() 638 if (caps->permitted.val & ~new->cap_permitted.val) in bprm_caps_from_vfs_caps() 728 cpu_caps->permitted.val = le32_to_cpu(caps->data[0].permitted); in get_vfs_caps_from_disk() 729 cpu_caps->inheritable.val = le32_to_cpu(caps->data[0].inheritable); in get_vfs_caps_from_disk() 736 cpu_caps->permitted.val += (u64)le32_to_cpu(caps->data[1].permitted) << 32; in get_vfs_caps_from_disk() 737 cpu_caps->inheritable.val += (u64)le32_to_cpu(caps->data[1].inheritable) << 32; in get_vfs_caps_from_disk() 740 cpu_caps->permitted.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk() 741 cpu_caps->inheritable.val &= CAP_VALID_MASK; in get_vfs_caps_from_disk()
|
| A D | security.c | 883 void *val, size_t val_len, in lsm_fill_user_ctx() argument 909 memcpy(nctx->ctx, val, val_len); in lsm_fill_user_ctx()
|
| /security/ipe/ |
| A D | digest.h | 22 void ipe_digest_audit(struct audit_buffer *ab, const struct digest_info *val);
|
| /security/integrity/ima/ |
| A D | ima_fs.c | 42 loff_t *ppos, atomic_long_t *val) in ima_show_htable_value() argument 47 len = scnprintf(tmpbuf, sizeof(tmpbuf), "%li\n", atomic_long_read(val)); in ima_show_htable_value()
|
| A D | ima_crypto.c | 34 static int param_set_bufsize(const char *val, const struct kernel_param *kp) in param_set_bufsize() argument 39 size = memparse(val, NULL); in param_set_bufsize()
|
| /security/selinux/include/ |
| A D | security.h | 395 extern void selnl_notify_setenforce(int val);
|
Completed in 52 milliseconds