/security/apparmor/include/ |
D | task.h | 29 u64 token; 34 int aa_set_current_hat(struct aa_label *label, u64 token); 35 int aa_restore_previous_label(u64 cookie);
|
D | apparmorfs.h | 34 unsigned long u64; member 52 .v_type = AA_SFS_TYPE_U64, .v.u64 = (_value), \
|
D | domain.h | 36 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
|
/security/selinux/ss/ |
D | ebitmap.c | 26 #define BITS_PER_U64 (sizeof(u64) * 8) 351 u64 map; in ebitmap_read() 428 rc = next_entry(&mapbits, fp, sizeof(u64)); in ebitmap_read() 457 u64 map; in ebitmap_write() 488 map = (u64)1 << (bit - last_startbit); in ebitmap_write() 499 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write() 507 map |= (u64)1 << (bit - last_startbit); in ebitmap_write() 520 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write()
|
D | policydb.h | 187 u64 subnet_prefix;
|
D | policydb.c | 2191 rc = next_entry(prefixbuf, fp, sizeof(u64)); in ocontext_read() 3185 rc = put_entry(prefixbuf, sizeof(u64), 1, fp); in ocontext_write()
|
D | services.c | 2405 u64 subnet_prefix, u16 pkey_num, u32 *out_sid) in security_ib_pkey_sid() 2588 if (addrlen != sizeof(u64) * 2) in security_node_sid()
|
/security/selinux/ |
D | ibpkey.c | 71 static struct sel_ib_pkey *sel_ib_pkey_find(u64 subnet_prefix, u16 pkey_num) in sel_ib_pkey_find() 130 static int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid_slow() 182 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid()
|
D | hooks.c | 3318 static int selinux_path_notify(const struct path *path, u64 mask, in selinux_path_notify() 6677 static int selinux_ib_pkey_access(void *ib_sec, u64 subnet_prefix, u16 pkey_val) in selinux_ib_pkey_access()
|
/security/apparmor/ |
D | procattr.c | 78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() 105 u64 token; in aa_setprocattr_changehat()
|
D | task.c | 115 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() 155 int aa_restore_previous_label(u64 token) in aa_restore_previous_label()
|
D | policy_unpack.c | 332 static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name) in unpack_u64() 337 if (!inbounds(e, sizeof(u64))) in unpack_u64() 341 e->pos += sizeof(u64); in unpack_u64() 632 u64 tmp2 = 0; in unpack_rlimits()
|
D | domain.c | 1167 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat()
|
D | apparmorfs.c | 1004 seq_printf(seq, "%#08lx\n", fs_file->v.u64); in aa_sfs_seq_show()
|
/security/selinux/include/ |
D | ibpkey.h | 19 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid);
|
D | objsec.h | 138 u64 subnet_prefix; /* Port subnet prefix */
|
D | security.h | 302 u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
|
/security/keys/ |
D | keyring.c | 153 static u64 mult_64x32_and_fold(u64 x, u32 y) in mult_64x32_and_fold() 155 u64 hi = (u64)(u32)(x >> 32) * y; in mult_64x32_and_fold() 156 u64 lo = (u64)(u32)(x) * y; in mult_64x32_and_fold() 157 return lo + ((u64)(u32)hi << 32) + (u32)(hi >> 32); in mult_64x32_and_fold() 170 u64 acc; in hash_key_type_and_desc()
|
D | proc.c | 162 u64 timo; in proc_keys_show()
|
/security/integrity/ima/ |
D | ima.h | 114 u64 buffer_size; 115 u64 count;
|
D | ima_api.c | 217 u64 i_version; in ima_collect_measurement()
|
/security/integrity/ |
D | integrity.h | 123 u64 version; /* track inode changes */
|
/security/ |
D | security.c | 920 int security_path_notify(const struct path *path, u64 mask, in security_path_notify() 2231 int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey) in security_ib_pkey_access()
|