Searched refs:t (Results 1 – 4 of 4) sorted by relevance
/security/smack/ |
D | smack.h | 337 struct task_struct *t) in smk_ad_setfield_u_tsk() argument 339 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 369 struct task_struct *t) in smk_ad_setfield_u_tsk() argument
|
/security/selinux/ss/ |
D | policydb.c | 1179 static void type_set_init(struct type_set *t) in type_set_init() argument 1181 ebitmap_init(&t->types); in type_set_init() 1182 ebitmap_init(&t->negset); in type_set_init() 1185 static int type_set_read(struct type_set *t, void *fp) in type_set_read() argument 1190 if (ebitmap_read(&t->types, fp)) in type_set_read() 1192 if (ebitmap_read(&t->negset, fp)) in type_set_read() 1198 t->flags = le32_to_cpu(buf[0]); in type_set_read() 2812 static int type_set_write(struct type_set *t, void *fp) in type_set_write() argument 2817 if (ebitmap_write(&t->types, fp)) in type_set_write() 2819 if (ebitmap_write(&t->negset, fp)) in type_set_write() [all …]
|
D | services.c | 757 char *o = NULL, *n = NULL, *t = NULL; in security_validtrans_handle_fail() local 764 if (context_struct_to_string(tcontext, &t, &tlen)) in security_validtrans_handle_fail() 769 o, n, t, sym_name(&policydb, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail() 773 kfree(t); in security_validtrans_handle_fail() 1513 char *s = NULL, *t = NULL, *n = NULL; in compute_sid_handle_invalid_context() local 1518 if (context_struct_to_string(tcontext, &t, &tlen)) in compute_sid_handle_invalid_context() 1527 n, s, t, sym_name(&policydb, SYM_CLASSES, tclass-1)); in compute_sid_handle_invalid_context() 1530 kfree(t); in compute_sid_handle_invalid_context()
|
/security/tomoyo/ |
D | Kconfig | 37 If you don't need audit logs, you may set this value to 0.
|