Home
last modified time | relevance | path

Searched refs:value (Results 1 – 25 of 44) sorted by relevance

12

/security/tomoyo/
A Dcondition.c78 if (envp->value) { in tomoyo_envp()
334 value = NULL; in tomoyo_parse_envp()
337 if (!value) { in tomoyo_parse_envp()
343 envp->value = value; in tomoyo_parse_envp()
901 value = 0400; in tomoyo_condition()
904 value = 0200; in tomoyo_condition()
907 value = 0100; in tomoyo_condition()
910 value = 0040; in tomoyo_condition()
913 value = 0020; in tomoyo_condition()
916 value = 0010; in tomoyo_condition()
[all …]
A DKconfig22 This is the default value for maximal ACL entries
35 This is the default value for maximal entries for
38 If you don't need audit logs, you may set this value to 0.
/security/ipe/
A Dhooks.c212 const void *value, in ipe_set_dmverity_signature() argument
215 blob->dm_verity_signed = size > 0 && value; in ipe_set_dmverity_signature()
219 const void *value, in ipe_set_dmverity_signature() argument
239 const void *value, size_t size) in ipe_bdev_setintegrity() argument
246 ipe_set_dmverity_signature(blob, value, size); in ipe_bdev_setintegrity()
254 if (!value) { in ipe_bdev_setintegrity()
260 digest = value; in ipe_bdev_setintegrity()
303 const void *value, size_t size) in ipe_inode_setintegrity() argument
308 inode_sec->fs_verity_signed = size > 0 && value; in ipe_inode_setintegrity()
A Dpolicy_fs.c213 bool value = false; in setactive() local
219 rc = kstrtobool_from_user(data, len, &value); in setactive()
223 if (!value) in setactive()
353 bool value = false; in delete_policy() local
359 rc = kstrtobool_from_user(data, len, &value); in delete_policy()
363 if (!value) in delete_policy()
A Dhooks.h44 const void *value, size_t len);
49 const void *value, size_t size);
A Dfs.c33 bool value; in setaudit() local
38 rc = kstrtobool_from_user(data, len, &value); in setaudit()
42 WRITE_ONCE(success_audit, value); in setaudit()
A Dpolicy_parser.c225 ipe_digest_free(p->value); in free_rule()
322 p->value = ipe_digest_parse(dup); in parse_property()
323 if (IS_ERR(p->value)) { in parse_property()
324 rc = PTR_ERR(p->value); in parse_property()
A Daudit.c102 audit_dmv_roothash(ab, ptr->value); in audit_rule()
105 audit_fsv_digest(ab, ptr->value); in audit_rule()
A Deval.c139 ipe_digest_eval(p->value, in evaluate_dmv_roothash()
217 return ipe_digest_eval(p->value, &info); in evaluate_fsv_digest()
A Dpolicy.h50 void *value; member
/security/selinux/ss/
A Dpolicydb.h40 u32 value; /* permission bit + 1 */ member
45 u32 value; /* internal common value */ member
51 u32 value; /* class value */ member
76 u32 value; /* internal role value */ member
112 u32 value; /* internal type value */ member
120 u32 value; /* internal user value */ member
135 u32 value; /* internal category bit + 1 */ member
147 u32 value; /* internal type value */ member
A Dpolicydb.c398 role->value = ++p->p_roles.nprim; in roles_init()
399 if (role->value != OBJECT_R_VAL) in roles_init()
559 if (!comdatum->value || comdatum->value > p->p_commons.nprim) in common_index()
574 if (!cladatum->value || cladatum->value > p->p_classes.nprim) in class_index()
589 if (!role->value || role->value > p->p_roles.nprim || in role_index()
607 if (!typdatum->value || typdatum->value > p->p_types.nprim || in type_index()
624 if (!usrdatum->value || usrdatum->value > p->p_users.nprim || in user_index()
661 if (!catdatum->value || catdatum->value > p->p_cats.nprim) in cat_index()
1442 role->value = le32_to_cpu(buf[1]); in role_read()
1462 OBJECT_R, role->value); in role_read()
[all …]
A Dmls.c313 catdatum->value - 1, 1); in mls_context_to_sid()
325 if (catdatum->value >= rngdatum->value) in mls_context_to_sid()
328 for (i = catdatum->value; i < rngdatum->value; i++) { in mls_context_to_sid()
471 catdatum->value - 1, 1); in mls_convert_context()
A Dservices.c129 if (!p_out->value) { in selinux_set_mapping()
449 BUG_ON(pdatum->value < 1 || pdatum->value > 32); in dump_masked_av_helper()
1522 ctx->role = role->value; in string_to_context_struct()
3416 u32 value = datum->value - 1; in get_classes_callback() local
3419 if (!classes[value]) in get_classes_callback()
3457 u32 value = datum->value - 1; in get_permissions_callback() local
3460 if (!perms[value]) in get_permissions_callback()
3515 int value; in security_get_reject_unknown() local
3524 return value; in security_get_reject_unknown()
3530 int value; in security_get_allow_unknown() local
[all …]
A Dconditional.c193 if (!booldatum->value || booldatum->value > p->p_bools.nprim) in cond_index_bool()
196 p->sym_val_to_name[SYM_BOOLS][booldatum->value - 1] = key; in cond_index_bool()
197 p->bool_val_to_struct[booldatum->value - 1] = booldatum; in cond_index_bool()
225 booldatum->value = le32_to_cpu(buf[0]); in cond_read_bool()
456 buf[0] = cpu_to_le32(booldatum->value); in cond_write_bool()
702 cond_bool_array[booldatum->value - 1] = booldatum; in cond_bools_index()
A Dservices.h15 u16 value; /* policy value for class */ member
/security/keys/trusted-keys/
A Dtrusted_tpm2.c144 const void *value, size_t vlen) in tpm2_key_parent() argument
147 const u8 *v = value; in tpm2_key_parent()
161 const void *value, size_t vlen) in tpm2_key_type() argument
163 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type()
168 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type()
179 const void *value, size_t vlen) in tpm2_key_pub() argument
183 ctx->pub = value; in tpm2_key_pub()
191 const void *value, size_t vlen) in tpm2_key_priv() argument
195 ctx->priv = value; in tpm2_key_priv()
/security/apparmor/
A Dlib.c30 int value; member
75 val |= ent->value; in aa_parse_debug_params()
98 if (ent->value && (ent->value & mask) == ent->value) { in val_mask_to_str()
104 mask &= ~ent->value; in val_mask_to_str()
A Dlsm.c794 char *value = NULL; in apparmor_getselfattr() local
818 kfree(value); in apparmor_getselfattr()
829 char **value) in apparmor_getprocattr() argument
872 memcpy(args, value, size); in do_setattr()
953 return do_setattr(attr, value, size); in apparmor_setprocattr()
1983 bool value; in param_set_aaintbool() local
1990 value = !!*((int *)kp->arg); in param_set_aaintbool()
1992 kp_local.arg = &value; in param_set_aaintbool()
2009 bool value; in param_get_aaintbool() local
2012 value = !!*((int *)kp->arg); in param_get_aaintbool()
[all …]
A Dresource.c58 unsigned long value, struct aa_label *peer, in audit_resource() argument
66 ad.rlim.max = value; in audit_resource()
/security/integrity/evm/
A Devm_crypto.c203 static void dump_security_xattr(const char *name, const char *value, in dump_security_xattr() argument
208 (int)value_len, value); in dump_security_xattr()
210 dump_security_xattr_l(name, value, value_len); in dump_security_xattr()
415 crypto_shash_update(desc, xattr->value, xattr->value_len); in evm_init_hmac()
/security/selinux/include/
A Dsecurity.h130 static inline void enforcing_set(bool value) in enforcing_set() argument
132 WRITE_ONCE(selinux_state.enforcing, value); in enforcing_set()
140 static inline void enforcing_set(bool value) in enforcing_set() argument
/security/smack/
A Dsmack_lsm.c1022 xattr_transmute->value = kmemdup(TRANS_TRUE, in smack_inode_init_security()
1025 if (!xattr_transmute->value) in smack_inode_init_security()
1037 if (!xattr->value) in smack_inode_init_security()
1310 const void *value, size_t size, int flags) in smack_inode_setxattr() argument
1386 skp = smk_import_entry(value, size); in smack_inode_post_setxattr()
1390 skp = smk_import_entry(value, size); in smack_inode_post_setxattr()
1394 skp = smk_import_entry(value, size); in smack_inode_post_setxattr()
2886 skp = smk_import_entry(value, size); in smack_inode_setsecurity()
3714 *value = cp; in smack_getprocattr()
3746 skp = smk_import_entry(value, size); in do_setattr()
[all …]
/security/selinux/
A DKconfig58 chain lengths are high (e.g. > 20) then selecting a higher value here
70 If unsure, keep the default value.
/security/
A Dsecurity.c1855 kfree(new_xattrs[xattr_count - 1].value); in security_inode_init_security()
2408 const void *value, size_t size, int flags) in security_inode_setxattr() argument
2417 rc = cap_inode_setxattr(dentry, name, value, size, flags); in security_inode_setxattr()
2530 const void *value, size_t size, int flags) in security_inode_post_setxattr() argument
2731 const void *value, size_t size, int flags) in security_inode_setsecurity() argument
2736 return call_int_hook(inode_setsecurity, inode, name, value, size, in security_inode_setsecurity()
2830 enum lsm_integrity_type type, const void *value, in security_inode_setintegrity() argument
4273 char **value) in security_getprocattr() argument
4280 return scall->hl->hook.getprocattr(p, name, value); in security_getprocattr()
4304 return scall->hl->hook.setprocattr(name, value, size); in security_setprocattr()
[all …]

Completed in 67 milliseconds

12