Home
last modified time | relevance | path

Searched refs:args (Results 1 – 18 of 18) sorted by relevance

/security/apparmor/
Dprocattr.c78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument
82 *token = simple_strtoull(args, &name, 16); in split_token_from_name()
83 if ((name == args) || *name != '^') { in split_token_from_name()
84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name()
102 int aa_setprocattr_changehat(char *args, size_t size, int flags) in aa_setprocattr_changehat() argument
109 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat()
125 char *end = args + size; in aa_setprocattr_changehat()
Dlsm.c618 char *command, *largs = NULL, *args = value; in apparmor_setprocattr() local
627 if (args[size - 1] != '\0') { in apparmor_setprocattr()
629 largs = args = kmalloc(size + 1, GFP_KERNEL); in apparmor_setprocattr()
630 if (!args) in apparmor_setprocattr()
632 memcpy(args, value, size); in apparmor_setprocattr()
633 args[size] = '\0'; in apparmor_setprocattr()
637 args = strim(args); in apparmor_setprocattr()
638 command = strsep(&args, " "); in apparmor_setprocattr()
639 if (!args) in apparmor_setprocattr()
641 args = skip_spaces(args); in apparmor_setprocattr()
[all …]
/security/apparmor/include/
Dlib.h31 #define AA_DEBUG(fmt, args...) \ argument
34 pr_debug_ratelimited("AppArmor: " fmt, ##args); \
39 #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args) argument
41 #define AA_BUG_FMT(X, fmt, args...) \ argument
42 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args)
44 #define AA_BUG_FMT(X, fmt, args...) argument
47 #define AA_ERROR(fmt, args...) \ argument
48 pr_err_ratelimited("AppArmor: " fmt, ##args)
55 char *aa_split_fqname(char *args, char **ns_name);
Dperms.h107 #define xcheck_ns_profile_profile(P1, P2, FN, args...) \ argument
111 ____e = FN((P1), (P2), args); \
115 #define xcheck_ns_profile_label(P, L, FN, args...) \ argument
119 xcheck_ns_profile_profile((P), __p2, (FN), args)); \
122 #define xcheck_ns_labels(L1, L2, FN, args...) \ argument
125 fn_for_each((L1), __p1, FN(__p1, (L2), args)); \
129 #define xcheck_labels_profiles(L1, L2, FN, args...) \ argument
130 xcheck_ns_labels((L1), (L2), xcheck_ns_profile_label, (FN), args)
Dprocattr.h15 int aa_setprocattr_changehat(char *args, size_t size, int flags);
/security/integrity/ima/
Dima_policy.c973 substring_t *args, int lsm_rule, int audit_type) in ima_lsm_rule_init() argument
980 entry->lsm[lsm_rule].args_p = match_strdup(args); in ima_lsm_rule_init()
1162 substring_t args[MAX_OPT_ARGS]; in ima_parse_rule() local
1170 token = match_token(p, policy_tokens, args); in ima_parse_rule()
1229 ima_log_string(ab, "func", args[0].from); in ima_parse_rule()
1234 if (strcmp(args[0].from, "FILE_CHECK") == 0) in ima_parse_rule()
1237 else if (strcmp(args[0].from, "PATH_CHECK") == 0) in ima_parse_rule()
1239 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) in ima_parse_rule()
1241 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) in ima_parse_rule()
1243 else if ((strcmp(args[0].from, "FILE_MMAP") == 0) in ima_parse_rule()
[all …]
/security/selinux/ss/
Dhashtab.c86 int (*apply)(void *k, void *d, void *args), in hashtab_map() argument
87 void *args) in hashtab_map()
96 ret = apply(cur->key, cur->datum, args); in hashtab_map()
134 struct hashtab_node *orig, void *args), in hashtab_duplicate() argument
135 int (*destroy)(void *k, void *d, void *args), in hashtab_duplicate()
136 void *args) in hashtab_duplicate()
156 rc = copy(tmp, cur, args); in hashtab_duplicate()
177 destroy(cur->key, cur->datum, args); in hashtab_duplicate()
Dhashtab.h136 int (*apply)(void *k, void *d, void *args),
137 void *args);
141 struct hashtab_node *orig, void *args),
142 int (*destroy)(void *k, void *d, void *args),
143 void *args);
Dservices.c78 struct convert_context_args args; member
449 static int dump_masked_av_helper(void *k, void *d, void *args) in dump_masked_av_helper() argument
452 char **permission_names = args; in dump_masked_av_helper()
2019 struct convert_context_args *args; in convert_context() local
2028 args = p; in convert_context()
2035 rc = string_to_context_struct(args->newp, NULL, s, in convert_context()
2067 usrdatum = symtab_search(&args->newp->p_users, in convert_context()
2068 sym_name(args->oldp, in convert_context()
2076 role = symtab_search(&args->newp->p_roles, in convert_context()
2077 sym_name(args->oldp, SYM_ROLES, oldc->role - 1)); in convert_context()
[all …]
Dsidtab.h68 int (*func)(struct context *oldc, struct context *newc, void *args, gfp_t gfp_flags);
69 void *args; member
Dconditional.c679 static int cond_bools_destroy(void *key, void *datum, void *args) in cond_bools_destroy() argument
686 static int cond_bools_copy(struct hashtab_node *new, struct hashtab_node *orig, void *args) in cond_bools_copy() argument
700 static int cond_bools_index(void *key, void *datum, void *args) in cond_bools_index() argument
705 cond_bool_array = args; in cond_bools_index()
Dsidtab.c328 convert->args, GFP_ATOMIC); in sidtab_context_to_sid()
407 convert->args, GFP_KERNEL); in sidtab_convert_tree()
/security/tomoyo/
Daudit.c245 va_list args) in tomoyo_init_log() argument
290 vsnprintf(buf + pos, len - pos, fmt, args); in tomoyo_init_log()
366 va_list args) in tomoyo_write_log2() argument
375 buf = tomoyo_init_log(r, len, fmt, args); in tomoyo_write_log2()
421 va_list args; in tomoyo_write_log() local
424 va_start(args, fmt); in tomoyo_write_log()
425 len = vsnprintf((char *) &len, 1, fmt, args) + 1; in tomoyo_write_log()
426 va_end(args); in tomoyo_write_log()
427 va_start(args, fmt); in tomoyo_write_log()
428 tomoyo_write_log2(r, len, fmt, args); in tomoyo_write_log()
[all …]
Dcommon.c198 va_list args; in tomoyo_addprintf() local
201 va_start(args, fmt); in tomoyo_addprintf()
202 vsnprintf(buffer + pos, len - pos - 1, fmt, args); in tomoyo_addprintf()
203 va_end(args); in tomoyo_addprintf()
280 va_list args; in tomoyo_io_printf() local
287 va_start(args, fmt); in tomoyo_io_printf()
288 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; in tomoyo_io_printf()
289 va_end(args); in tomoyo_io_printf()
2061 va_list args; in tomoyo_supervisor() local
2068 va_start(args, fmt); in tomoyo_supervisor()
[all …]
Dcommon.h957 va_list args);
1071 va_list args);
/security/keys/trusted-keys/
Dtrusted_tpm1.c746 substring_t args[MAX_OPT_ARGS]; in getoptions() local
766 token = match_token(p, key_tokens, args); in getoptions()
772 opt->pcrinfo_len = strlen(args[0].from) / 2; in getoptions()
775 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions()
781 res = kstrtoul(args[0].from, 16, &handle); in getoptions()
788 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) in getoptions()
790 res = hex2bin(opt->keyauth, args[0].from, in getoptions()
801 opt->blobauth_len = strlen(args[0].from); in getoptions()
804 res = hex2bin(opt->blobauth, args[0].from, in getoptions()
814 memcpy(opt->blobauth, args[0].from, in getoptions()
[all …]
/security/keys/
Dkeyctl_pkey.c41 substring_t args[MAX_OPT_ARGS]; in keyctl_pkey_params_parse() local
48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse()
53 q = args[0].from; in keyctl_pkey_params_parse()
/security/keys/encrypted-keys/
Dencrypted.c175 substring_t args[MAX_OPT_ARGS]; in datablob_parse() local
186 key_cmd = match_token(keyword, key_tokens, args); in datablob_parse()
195 key_format = match_token(p, key_format_tokens, args); in datablob_parse()