| /security/tomoyo/ |
| A D | condition.c | 78 if (envp->value) { in tomoyo_envp() 334 value = NULL; in tomoyo_parse_envp() 337 if (!value) { in tomoyo_parse_envp() 343 envp->value = value; in tomoyo_parse_envp() 901 value = 0400; in tomoyo_condition() 904 value = 0200; in tomoyo_condition() 907 value = 0100; in tomoyo_condition() 910 value = 0040; in tomoyo_condition() 913 value = 0020; in tomoyo_condition() 916 value = 0010; in tomoyo_condition() [all …]
|
| A D | Kconfig | 22 This is the default value for maximal ACL entries 35 This is the default value for maximal entries for 38 If you don't need audit logs, you may set this value to 0.
|
| /security/ipe/ |
| A D | hooks.c | 212 const void *value, in ipe_set_dmverity_signature() argument 215 blob->dm_verity_signed = size > 0 && value; in ipe_set_dmverity_signature() 219 const void *value, in ipe_set_dmverity_signature() argument 239 const void *value, size_t size) in ipe_bdev_setintegrity() argument 246 ipe_set_dmverity_signature(blob, value, size); in ipe_bdev_setintegrity() 254 if (!value) { in ipe_bdev_setintegrity() 260 digest = value; in ipe_bdev_setintegrity() 303 const void *value, size_t size) in ipe_inode_setintegrity() argument 308 inode_sec->fs_verity_signed = size > 0 && value; in ipe_inode_setintegrity()
|
| A D | policy_fs.c | 213 bool value = false; in setactive() local 219 rc = kstrtobool_from_user(data, len, &value); in setactive() 223 if (!value) in setactive() 353 bool value = false; in delete_policy() local 359 rc = kstrtobool_from_user(data, len, &value); in delete_policy() 363 if (!value) in delete_policy()
|
| A D | hooks.h | 44 const void *value, size_t len); 49 const void *value, size_t size);
|
| A D | fs.c | 33 bool value; in setaudit() local 38 rc = kstrtobool_from_user(data, len, &value); in setaudit() 42 WRITE_ONCE(success_audit, value); in setaudit()
|
| A D | policy_parser.c | 225 ipe_digest_free(p->value); in free_rule() 322 p->value = ipe_digest_parse(dup); in parse_property() 323 if (IS_ERR(p->value)) { in parse_property() 324 rc = PTR_ERR(p->value); in parse_property()
|
| A D | audit.c | 102 audit_dmv_roothash(ab, ptr->value); in audit_rule() 105 audit_fsv_digest(ab, ptr->value); in audit_rule()
|
| A D | eval.c | 139 ipe_digest_eval(p->value, in evaluate_dmv_roothash() 217 return ipe_digest_eval(p->value, &info); in evaluate_fsv_digest()
|
| A D | policy.h | 50 void *value; member
|
| /security/selinux/ss/ |
| A D | policydb.h | 40 u32 value; /* permission bit + 1 */ member 45 u32 value; /* internal common value */ member 51 u32 value; /* class value */ member 76 u32 value; /* internal role value */ member 112 u32 value; /* internal type value */ member 120 u32 value; /* internal user value */ member 135 u32 value; /* internal category bit + 1 */ member 147 u32 value; /* internal type value */ member
|
| A D | policydb.c | 398 role->value = ++p->p_roles.nprim; in roles_init() 399 if (role->value != OBJECT_R_VAL) in roles_init() 559 if (!comdatum->value || comdatum->value > p->p_commons.nprim) in common_index() 574 if (!cladatum->value || cladatum->value > p->p_classes.nprim) in class_index() 589 if (!role->value || role->value > p->p_roles.nprim || in role_index() 607 if (!typdatum->value || typdatum->value > p->p_types.nprim || in type_index() 624 if (!usrdatum->value || usrdatum->value > p->p_users.nprim || in user_index() 661 if (!catdatum->value || catdatum->value > p->p_cats.nprim) in cat_index() 1442 role->value = le32_to_cpu(buf[1]); in role_read() 1462 OBJECT_R, role->value); in role_read() [all …]
|
| A D | mls.c | 313 catdatum->value - 1, 1); in mls_context_to_sid() 325 if (catdatum->value >= rngdatum->value) in mls_context_to_sid() 328 for (i = catdatum->value; i < rngdatum->value; i++) { in mls_context_to_sid() 471 catdatum->value - 1, 1); in mls_convert_context()
|
| A D | services.c | 129 if (!p_out->value) { in selinux_set_mapping() 449 BUG_ON(pdatum->value < 1 || pdatum->value > 32); in dump_masked_av_helper() 1522 ctx->role = role->value; in string_to_context_struct() 3416 u32 value = datum->value - 1; in get_classes_callback() local 3419 if (!classes[value]) in get_classes_callback() 3457 u32 value = datum->value - 1; in get_permissions_callback() local 3460 if (!perms[value]) in get_permissions_callback() 3515 int value; in security_get_reject_unknown() local 3524 return value; in security_get_reject_unknown() 3530 int value; in security_get_allow_unknown() local [all …]
|
| A D | conditional.c | 193 if (!booldatum->value || booldatum->value > p->p_bools.nprim) in cond_index_bool() 196 p->sym_val_to_name[SYM_BOOLS][booldatum->value - 1] = key; in cond_index_bool() 197 p->bool_val_to_struct[booldatum->value - 1] = booldatum; in cond_index_bool() 225 booldatum->value = le32_to_cpu(buf[0]); in cond_read_bool() 456 buf[0] = cpu_to_le32(booldatum->value); in cond_write_bool() 702 cond_bool_array[booldatum->value - 1] = booldatum; in cond_bools_index()
|
| A D | services.h | 15 u16 value; /* policy value for class */ member
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm2.c | 144 const void *value, size_t vlen) in tpm2_key_parent() argument 147 const u8 *v = value; in tpm2_key_parent() 161 const void *value, size_t vlen) in tpm2_key_type() argument 163 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type() 168 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type() 179 const void *value, size_t vlen) in tpm2_key_pub() argument 183 ctx->pub = value; in tpm2_key_pub() 191 const void *value, size_t vlen) in tpm2_key_priv() argument 195 ctx->priv = value; in tpm2_key_priv()
|
| /security/apparmor/ |
| A D | lib.c | 30 int value; member 75 val |= ent->value; in aa_parse_debug_params() 98 if (ent->value && (ent->value & mask) == ent->value) { in val_mask_to_str() 104 mask &= ~ent->value; in val_mask_to_str()
|
| A D | lsm.c | 794 char *value = NULL; in apparmor_getselfattr() local 818 kfree(value); in apparmor_getselfattr() 829 char **value) in apparmor_getprocattr() argument 872 memcpy(args, value, size); in do_setattr() 953 return do_setattr(attr, value, size); in apparmor_setprocattr() 1983 bool value; in param_set_aaintbool() local 1990 value = !!*((int *)kp->arg); in param_set_aaintbool() 1992 kp_local.arg = &value; in param_set_aaintbool() 2009 bool value; in param_get_aaintbool() local 2012 value = !!*((int *)kp->arg); in param_get_aaintbool() [all …]
|
| A D | resource.c | 58 unsigned long value, struct aa_label *peer, in audit_resource() argument 66 ad.rlim.max = value; in audit_resource()
|
| /security/integrity/evm/ |
| A D | evm_crypto.c | 203 static void dump_security_xattr(const char *name, const char *value, in dump_security_xattr() argument 208 (int)value_len, value); in dump_security_xattr() 210 dump_security_xattr_l(name, value, value_len); in dump_security_xattr() 415 crypto_shash_update(desc, xattr->value, xattr->value_len); in evm_init_hmac()
|
| /security/selinux/include/ |
| A D | security.h | 130 static inline void enforcing_set(bool value) in enforcing_set() argument 132 WRITE_ONCE(selinux_state.enforcing, value); in enforcing_set() 140 static inline void enforcing_set(bool value) in enforcing_set() argument
|
| /security/smack/ |
| A D | smack_lsm.c | 1022 xattr_transmute->value = kmemdup(TRANS_TRUE, in smack_inode_init_security() 1025 if (!xattr_transmute->value) in smack_inode_init_security() 1037 if (!xattr->value) in smack_inode_init_security() 1310 const void *value, size_t size, int flags) in smack_inode_setxattr() argument 1386 skp = smk_import_entry(value, size); in smack_inode_post_setxattr() 1390 skp = smk_import_entry(value, size); in smack_inode_post_setxattr() 1394 skp = smk_import_entry(value, size); in smack_inode_post_setxattr() 2886 skp = smk_import_entry(value, size); in smack_inode_setsecurity() 3714 *value = cp; in smack_getprocattr() 3746 skp = smk_import_entry(value, size); in do_setattr() [all …]
|
| /security/selinux/ |
| A D | Kconfig | 58 chain lengths are high (e.g. > 20) then selecting a higher value here 70 If unsure, keep the default value.
|
| /security/ |
| A D | security.c | 1855 kfree(new_xattrs[xattr_count - 1].value); in security_inode_init_security() 2408 const void *value, size_t size, int flags) in security_inode_setxattr() argument 2417 rc = cap_inode_setxattr(dentry, name, value, size, flags); in security_inode_setxattr() 2530 const void *value, size_t size, int flags) in security_inode_post_setxattr() argument 2731 const void *value, size_t size, int flags) in security_inode_setsecurity() argument 2736 return call_int_hook(inode_setsecurity, inode, name, value, size, in security_inode_setsecurity() 2830 enum lsm_integrity_type type, const void *value, in security_inode_setintegrity() argument 4273 char **value) in security_getprocattr() argument 4280 return scall->hl->hook.getprocattr(p, name, value); in security_getprocattr() 4304 return scall->hl->hook.setprocattr(name, value, size); in security_setprocattr() [all …]
|