/security/apparmor/ |
D | procattr.c | 78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 82 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 83 if ((name == args) || *name != '^') { in split_token_from_name() 84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name() 102 int aa_setprocattr_changehat(char *args, size_t size, int flags) in aa_setprocattr_changehat() argument 109 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat() 125 char *end = args + size; in aa_setprocattr_changehat()
|
D | lsm.c | 618 char *command, *largs = NULL, *args = value; in apparmor_setprocattr() local 627 if (args[size - 1] != '\0') { in apparmor_setprocattr() 629 largs = args = kmalloc(size + 1, GFP_KERNEL); in apparmor_setprocattr() 630 if (!args) in apparmor_setprocattr() 632 memcpy(args, value, size); in apparmor_setprocattr() 633 args[size] = '\0'; in apparmor_setprocattr() 637 args = strim(args); in apparmor_setprocattr() 638 command = strsep(&args, " "); in apparmor_setprocattr() 639 if (!args) in apparmor_setprocattr() 641 args = skip_spaces(args); in apparmor_setprocattr() [all …]
|
/security/apparmor/include/ |
D | lib.h | 31 #define AA_DEBUG(fmt, args...) \ argument 34 pr_debug_ratelimited("AppArmor: " fmt, ##args); \ 39 #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args) argument 41 #define AA_BUG_FMT(X, fmt, args...) \ argument 42 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args) 44 #define AA_BUG_FMT(X, fmt, args...) argument 47 #define AA_ERROR(fmt, args...) \ argument 48 pr_err_ratelimited("AppArmor: " fmt, ##args) 55 char *aa_split_fqname(char *args, char **ns_name);
|
D | perms.h | 107 #define xcheck_ns_profile_profile(P1, P2, FN, args...) \ argument 111 ____e = FN((P1), (P2), args); \ 115 #define xcheck_ns_profile_label(P, L, FN, args...) \ argument 119 xcheck_ns_profile_profile((P), __p2, (FN), args)); \ 122 #define xcheck_ns_labels(L1, L2, FN, args...) \ argument 125 fn_for_each((L1), __p1, FN(__p1, (L2), args)); \ 129 #define xcheck_labels_profiles(L1, L2, FN, args...) \ argument 130 xcheck_ns_labels((L1), (L2), xcheck_ns_profile_label, (FN), args)
|
D | procattr.h | 15 int aa_setprocattr_changehat(char *args, size_t size, int flags);
|
/security/integrity/ima/ |
D | ima_policy.c | 973 substring_t *args, int lsm_rule, int audit_type) in ima_lsm_rule_init() argument 980 entry->lsm[lsm_rule].args_p = match_strdup(args); in ima_lsm_rule_init() 1162 substring_t args[MAX_OPT_ARGS]; in ima_parse_rule() local 1170 token = match_token(p, policy_tokens, args); in ima_parse_rule() 1229 ima_log_string(ab, "func", args[0].from); in ima_parse_rule() 1234 if (strcmp(args[0].from, "FILE_CHECK") == 0) in ima_parse_rule() 1237 else if (strcmp(args[0].from, "PATH_CHECK") == 0) in ima_parse_rule() 1239 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) in ima_parse_rule() 1241 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) in ima_parse_rule() 1243 else if ((strcmp(args[0].from, "FILE_MMAP") == 0) in ima_parse_rule() [all …]
|
/security/selinux/ss/ |
D | hashtab.c | 86 int (*apply)(void *k, void *d, void *args), in hashtab_map() argument 87 void *args) in hashtab_map() 96 ret = apply(cur->key, cur->datum, args); in hashtab_map() 134 struct hashtab_node *orig, void *args), in hashtab_duplicate() argument 135 int (*destroy)(void *k, void *d, void *args), in hashtab_duplicate() 136 void *args) in hashtab_duplicate() 156 rc = copy(tmp, cur, args); in hashtab_duplicate() 177 destroy(cur->key, cur->datum, args); in hashtab_duplicate()
|
D | hashtab.h | 136 int (*apply)(void *k, void *d, void *args), 137 void *args); 141 struct hashtab_node *orig, void *args), 142 int (*destroy)(void *k, void *d, void *args), 143 void *args);
|
D | services.c | 78 struct convert_context_args args; member 449 static int dump_masked_av_helper(void *k, void *d, void *args) in dump_masked_av_helper() argument 452 char **permission_names = args; in dump_masked_av_helper() 2019 struct convert_context_args *args; in convert_context() local 2028 args = p; in convert_context() 2035 rc = string_to_context_struct(args->newp, NULL, s, in convert_context() 2067 usrdatum = symtab_search(&args->newp->p_users, in convert_context() 2068 sym_name(args->oldp, in convert_context() 2076 role = symtab_search(&args->newp->p_roles, in convert_context() 2077 sym_name(args->oldp, SYM_ROLES, oldc->role - 1)); in convert_context() [all …]
|
D | sidtab.h | 68 int (*func)(struct context *oldc, struct context *newc, void *args, gfp_t gfp_flags); 69 void *args; member
|
D | conditional.c | 679 static int cond_bools_destroy(void *key, void *datum, void *args) in cond_bools_destroy() argument 686 static int cond_bools_copy(struct hashtab_node *new, struct hashtab_node *orig, void *args) in cond_bools_copy() argument 700 static int cond_bools_index(void *key, void *datum, void *args) in cond_bools_index() argument 705 cond_bool_array = args; in cond_bools_index()
|
D | sidtab.c | 328 convert->args, GFP_ATOMIC); in sidtab_context_to_sid() 407 convert->args, GFP_KERNEL); in sidtab_convert_tree()
|
/security/tomoyo/ |
D | audit.c | 245 va_list args) in tomoyo_init_log() argument 290 vsnprintf(buf + pos, len - pos, fmt, args); in tomoyo_init_log() 366 va_list args) in tomoyo_write_log2() argument 375 buf = tomoyo_init_log(r, len, fmt, args); in tomoyo_write_log2() 421 va_list args; in tomoyo_write_log() local 424 va_start(args, fmt); in tomoyo_write_log() 425 len = vsnprintf((char *) &len, 1, fmt, args) + 1; in tomoyo_write_log() 426 va_end(args); in tomoyo_write_log() 427 va_start(args, fmt); in tomoyo_write_log() 428 tomoyo_write_log2(r, len, fmt, args); in tomoyo_write_log() [all …]
|
D | common.c | 198 va_list args; in tomoyo_addprintf() local 201 va_start(args, fmt); in tomoyo_addprintf() 202 vsnprintf(buffer + pos, len - pos - 1, fmt, args); in tomoyo_addprintf() 203 va_end(args); in tomoyo_addprintf() 280 va_list args; in tomoyo_io_printf() local 287 va_start(args, fmt); in tomoyo_io_printf() 288 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; in tomoyo_io_printf() 289 va_end(args); in tomoyo_io_printf() 2061 va_list args; in tomoyo_supervisor() local 2068 va_start(args, fmt); in tomoyo_supervisor() [all …]
|
D | common.h | 957 va_list args); 1071 va_list args);
|
/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 746 substring_t args[MAX_OPT_ARGS]; in getoptions() local 766 token = match_token(p, key_tokens, args); in getoptions() 772 opt->pcrinfo_len = strlen(args[0].from) / 2; in getoptions() 775 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions() 781 res = kstrtoul(args[0].from, 16, &handle); in getoptions() 788 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) in getoptions() 790 res = hex2bin(opt->keyauth, args[0].from, in getoptions() 801 opt->blobauth_len = strlen(args[0].from); in getoptions() 804 res = hex2bin(opt->blobauth, args[0].from, in getoptions() 814 memcpy(opt->blobauth, args[0].from, in getoptions() [all …]
|
/security/keys/ |
D | keyctl_pkey.c | 41 substring_t args[MAX_OPT_ARGS]; in keyctl_pkey_params_parse() local 48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse() 53 q = args[0].from; in keyctl_pkey_params_parse()
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 175 substring_t args[MAX_OPT_ARGS]; in datablob_parse() local 186 key_cmd = match_token(keyword, key_tokens, args); in datablob_parse() 195 key_format = match_token(p, key_format_tokens, args); in datablob_parse()
|