Home
last modified time | relevance | path

Searched refs:u64 (Results 1 – 23 of 23) sorted by relevance

/security/apparmor/include/
Dtask.h29 u64 token;
34 int aa_set_current_hat(struct aa_label *label, u64 token);
35 int aa_restore_previous_label(u64 cookie);
Dapparmorfs.h34 unsigned long u64; member
52 .v_type = AA_SFS_TYPE_U64, .v.u64 = (_value), \
Ddomain.h36 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
/security/selinux/ss/
Debitmap.c26 #define BITS_PER_U64 (sizeof(u64) * 8)
351 u64 map; in ebitmap_read()
428 rc = next_entry(&mapbits, fp, sizeof(u64)); in ebitmap_read()
457 u64 map; in ebitmap_write()
488 map = (u64)1 << (bit - last_startbit); in ebitmap_write()
499 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write()
507 map |= (u64)1 << (bit - last_startbit); in ebitmap_write()
520 rc = put_entry(buf64, sizeof(u64), 1, fp); in ebitmap_write()
Dpolicydb.h187 u64 subnet_prefix;
Dpolicydb.c2191 rc = next_entry(prefixbuf, fp, sizeof(u64)); in ocontext_read()
3185 rc = put_entry(prefixbuf, sizeof(u64), 1, fp); in ocontext_write()
Dservices.c2405 u64 subnet_prefix, u16 pkey_num, u32 *out_sid) in security_ib_pkey_sid()
2588 if (addrlen != sizeof(u64) * 2) in security_node_sid()
/security/selinux/
Dibpkey.c71 static struct sel_ib_pkey *sel_ib_pkey_find(u64 subnet_prefix, u16 pkey_num) in sel_ib_pkey_find()
130 static int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid_slow()
182 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid()
Dhooks.c3318 static int selinux_path_notify(const struct path *path, u64 mask, in selinux_path_notify()
6677 static int selinux_ib_pkey_access(void *ib_sec, u64 subnet_prefix, u16 pkey_val) in selinux_ib_pkey_access()
/security/apparmor/
Dprocattr.c78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name()
105 u64 token; in aa_setprocattr_changehat()
Dtask.c115 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat()
155 int aa_restore_previous_label(u64 token) in aa_restore_previous_label()
Dpolicy_unpack.c332 static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name) in unpack_u64()
337 if (!inbounds(e, sizeof(u64))) in unpack_u64()
341 e->pos += sizeof(u64); in unpack_u64()
632 u64 tmp2 = 0; in unpack_rlimits()
Ddomain.c1167 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat()
Dapparmorfs.c1004 seq_printf(seq, "%#08lx\n", fs_file->v.u64); in aa_sfs_seq_show()
/security/selinux/include/
Dibpkey.h19 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid);
Dobjsec.h138 u64 subnet_prefix; /* Port subnet prefix */
Dsecurity.h302 u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
/security/keys/
Dkeyring.c153 static u64 mult_64x32_and_fold(u64 x, u32 y) in mult_64x32_and_fold()
155 u64 hi = (u64)(u32)(x >> 32) * y; in mult_64x32_and_fold()
156 u64 lo = (u64)(u32)(x) * y; in mult_64x32_and_fold()
157 return lo + ((u64)(u32)hi << 32) + (u32)(hi >> 32); in mult_64x32_and_fold()
170 u64 acc; in hash_key_type_and_desc()
Dproc.c162 u64 timo; in proc_keys_show()
/security/integrity/ima/
Dima.h114 u64 buffer_size;
115 u64 count;
Dima_api.c217 u64 i_version; in ima_collect_measurement()
/security/integrity/
Dintegrity.h123 u64 version; /* track inode changes */
/security/
Dsecurity.c920 int security_path_notify(const struct path *path, u64 mask, in security_path_notify()
2231 int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey) in security_ib_pkey_access()