/security/integrity/ima/ |
D | ima_policy.c | 467 substring_t *args, int lsm_rule, int audit_type) in ima_lsm_rule_init() argument 474 entry->lsm[lsm_rule].args_p = match_strdup(args); in ima_lsm_rule_init() 511 substring_t args[MAX_OPT_ARGS]; in ima_parse_rule() local 519 token = match_token(p, policy_tokens, args); in ima_parse_rule() 562 ima_log_string(ab, "func", args[0].from); in ima_parse_rule() 567 if (strcmp(args[0].from, "FILE_CHECK") == 0) in ima_parse_rule() 570 else if (strcmp(args[0].from, "PATH_CHECK") == 0) in ima_parse_rule() 572 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) in ima_parse_rule() 574 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) in ima_parse_rule() 576 else if ((strcmp(args[0].from, "FILE_MMAP") == 0) in ima_parse_rule() [all …]
|
/security/apparmor/ |
D | procattr.c | 90 static char *split_token_from_name(int op, char *args, u64 * token) in split_token_from_name() argument 94 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 95 if ((name == args) || *name != '^') { in split_token_from_name() 96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args); in split_token_from_name() 114 int aa_setprocattr_changehat(char *args, size_t size, int test) in aa_setprocattr_changehat() argument 121 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat() 137 char *end = args + size; in aa_setprocattr_changehat()
|
D | lsm.c | 526 char *command, *args = value; in apparmor_setprocattr() local 536 if (args[size - 1] != '\0') { in apparmor_setprocattr() 539 args[size] = '\0'; in apparmor_setprocattr() 546 args = value; in apparmor_setprocattr() 547 args = strim(args); in apparmor_setprocattr() 548 command = strsep(&args, " "); in apparmor_setprocattr() 549 if (!args) in apparmor_setprocattr() 551 args = skip_spaces(args); in apparmor_setprocattr() 552 if (!*args) in apparmor_setprocattr() 555 arg_size = size - (args - (char *) value); in apparmor_setprocattr() [all …]
|
/security/apparmor/include/ |
D | apparmor.h | 50 #define AA_DEBUG(fmt, args...) \ argument 53 printk(KERN_DEBUG "AppArmor: " fmt, ##args); \ 56 #define AA_ERROR(fmt, args...) \ argument 59 printk(KERN_ERR "AppArmor: " fmt, ##args); \ 66 char *aa_split_fqname(char *args, char **ns_name);
|
D | procattr.h | 22 int aa_setprocattr_changehat(char *args, size_t size, int test);
|
/security/tomoyo/ |
D | audit.c | 242 va_list args) in tomoyo_init_log() argument 284 vsnprintf(buf + pos, len - pos, fmt, args); in tomoyo_init_log() 359 va_list args) in tomoyo_write_log2() argument 367 buf = tomoyo_init_log(r, len, fmt, args); in tomoyo_write_log2() 413 va_list args; in tomoyo_write_log() local 415 va_start(args, fmt); in tomoyo_write_log() 416 len = vsnprintf((char *) &len, 1, fmt, args) + 1; in tomoyo_write_log() 417 va_end(args); in tomoyo_write_log() 418 va_start(args, fmt); in tomoyo_write_log() 419 tomoyo_write_log2(r, len, fmt, args); in tomoyo_write_log() [all …]
|
D | common.c | 197 va_list args; in tomoyo_addprintf() local 199 va_start(args, fmt); in tomoyo_addprintf() 200 vsnprintf(buffer + pos, len - pos - 1, fmt, args); in tomoyo_addprintf() 201 va_end(args); in tomoyo_addprintf() 277 va_list args; in tomoyo_io_printf() local 283 va_start(args, fmt); in tomoyo_io_printf() 284 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; in tomoyo_io_printf() 285 va_end(args); in tomoyo_io_printf() 1997 va_list args; in tomoyo_supervisor() local 2003 va_start(args, fmt); in tomoyo_supervisor() [all …]
|
D | common.h | 946 va_list args); 1059 va_list args);
|
/security/selinux/ss/ |
D | hashtab.h | 81 int (*apply)(void *k, void *d, void *args), 82 void *args);
|
D | sidtab.h | 42 void *args), 43 void *args);
|
D | hashtab.c | 121 int (*apply)(void *k, void *d, void *args), in hashtab_map() argument 122 void *args) in hashtab_map() 134 ret = apply(cur->key, cur->datum, args); in hashtab_map()
|
D | services.c | 451 static int dump_masked_av_helper(void *k, void *d, void *args) in dump_masked_av_helper() argument 454 char **permission_names = args; in dump_masked_av_helper() 1857 struct convert_context_args *args; in convert_context() local 1871 args = p; in convert_context() 1881 rc = string_to_context_struct(args->newp, NULL, s, in convert_context() 1909 usrdatum = hashtab_search(args->newp->p_users.table, in convert_context() 1910 sym_name(args->oldp, SYM_USERS, c->user - 1)); in convert_context() 1917 role = hashtab_search(args->newp->p_roles.table, in convert_context() 1918 sym_name(args->oldp, SYM_ROLES, c->role - 1)); in convert_context() 1925 typdatum = hashtab_search(args->newp->p_types.table, in convert_context() [all …]
|
D | sidtab.c | 128 void *args), in sidtab_map() argument 129 void *args) in sidtab_map() 140 rc = apply(cur->sid, &cur->context, args); in sidtab_map()
|
/security/keys/ |
D | trusted.c | 733 substring_t args[MAX_OPT_ARGS]; in getoptions() local 743 token = match_token(p, key_tokens, args); in getoptions() 747 opt->pcrinfo_len = strlen(args[0].from) / 2; in getoptions() 750 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions() 756 res = kstrtoul(args[0].from, 16, &handle); in getoptions() 763 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) in getoptions() 765 res = hex2bin(opt->keyauth, args[0].from, in getoptions() 771 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) in getoptions() 773 res = hex2bin(opt->blobauth, args[0].from, in getoptions() 779 if (*args[0].from == '0') in getoptions() [all …]
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 180 substring_t args[MAX_OPT_ARGS]; in datablob_parse() local 191 key_cmd = match_token(keyword, key_tokens, args); in datablob_parse() 200 key_format = match_token(p, key_format_tokens, args); in datablob_parse()
|
/security/smack/ |
D | smack_lsm.c | 645 substring_t args[MAX_OPT_ARGS]; in smack_parse_opts_str() local 650 token = match_token(p, smk_mount_tokens, args); in smack_parse_opts_str() 656 fsdefault = match_strdup(&args[0]); in smack_parse_opts_str() 663 fsfloor = match_strdup(&args[0]); in smack_parse_opts_str() 670 fshat = match_strdup(&args[0]); in smack_parse_opts_str() 677 fsroot = match_strdup(&args[0]); in smack_parse_opts_str() 684 fstransmute = match_strdup(&args[0]); in smack_parse_opts_str()
|
/security/selinux/ |
D | hooks.c | 947 substring_t args[MAX_OPT_ARGS]; in selinux_parse_opts_str() local 952 token = match_token(p, tokens, args); in selinux_parse_opts_str() 961 context = match_strdup(&args[0]); in selinux_parse_opts_str() 974 fscontext = match_strdup(&args[0]); in selinux_parse_opts_str() 987 rootcontext = match_strdup(&args[0]); in selinux_parse_opts_str() 1000 defcontext = match_strdup(&args[0]); in selinux_parse_opts_str()
|