/security/tomoyo/ |
D | tomoyo.c | 291 unsigned long arg) in tomoyo_file_fcntl() argument 293 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) in tomoyo_file_fcntl() 296 O_WRONLY | (arg & O_APPEND)); in tomoyo_file_fcntl() 325 unsigned long arg) in tomoyo_file_ioctl() argument
|
D | condition.c | 30 struct tomoyo_path_info arg; in tomoyo_argv() local 32 arg.name = arg_ptr; in tomoyo_argv() 39 tomoyo_fill_path_info(&arg); in tomoyo_argv() 40 result = tomoyo_path_matches_pattern(&arg, argv->value); in tomoyo_argv()
|
/security/integrity/ima/ |
D | ima.h | 208 #define __ima_stringify(arg) (#arg) argument
|
D | ima_policy.c | 1270 static unsigned int ima_parse_appraise_algos(char *arg) in ima_parse_appraise_algos() argument 1276 while ((token = strsep(&arg, ",")) != NULL) { in ima_parse_appraise_algos()
|
/security/apparmor/ |
D | lsm.c | 1474 value = !!*((int *)kp->arg); in param_set_aaintbool() 1476 kp_local.arg = &value; in param_set_aaintbool() 1480 *((int *)kp->arg) = *((bool *)kp_local.arg); in param_set_aaintbool() 1496 value = !!*((int *)kp->arg); in param_get_aaintbool() 1498 kp_local.arg = &value; in param_get_aaintbool()
|
D | policy_unpack.c | 660 static int datacmp(struct rhashtable_compare_arg *arg, const void *obj) in datacmp() argument 663 const char * const *key = arg->key; in datacmp()
|
D | policy.c | 186 static void aa_free_data(void *ptr, void *arg) in aa_free_data() argument
|
D | apparmorfs.c | 1600 static void rawdata_link_cb(void *arg) in rawdata_link_cb() argument 1602 kfree(arg); in rawdata_link_cb()
|
/security/smack/ |
D | smack_lsm.c | 70 static int match_opt_prefix(char *s, int l, char **arg) in match_opt_prefix() argument 80 *arg = s + len + 1; in match_opt_prefix() 703 char *arg = NULL; in smack_sb_eat_lsm_opts() local 710 token = match_opt_prefix(from, len, &arg); in smack_sb_eat_lsm_opts() 712 arg = kmemdup_nul(arg, from + len - arg, GFP_KERNEL); in smack_sb_eat_lsm_opts() 713 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts() 715 kfree(arg); in smack_sb_eat_lsm_opts() 1556 unsigned long arg) in smack_file_ioctl() argument 1617 unsigned long arg) in smack_file_fcntl() argument
|
/security/selinux/ |
D | hooks.c | 398 static int match_opt_prefix(char *s, int l, char **arg) in match_opt_prefix() argument 409 *arg = s + len + 1; in match_opt_prefix() 2652 char *arg = NULL; in selinux_sb_eat_lsm_opts() local 2654 token = match_opt_prefix(from, len, &arg); in selinux_sb_eat_lsm_opts() 2660 if (arg) { in selinux_sb_eat_lsm_opts() 2661 for (p = q = arg; p < from + len; p++) { in selinux_sb_eat_lsm_opts() 2666 arg = kmemdup_nul(arg, q - arg, GFP_KERNEL); in selinux_sb_eat_lsm_opts() 2667 if (!arg) { in selinux_sb_eat_lsm_opts() 2672 rc = selinux_add_opt(token, arg, mnt_opts); in selinux_sb_eat_lsm_opts() 2674 kfree(arg); in selinux_sb_eat_lsm_opts() [all …]
|
/security/ |
D | security.c | 1554 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_ioctl() argument 1556 return call_int_hook(file_ioctl, 0, file, cmd, arg); in security_file_ioctl() 1572 unsigned long arg) in security_file_ioctl_compat() argument 1574 return call_int_hook(file_ioctl_compat, 0, file, cmd, arg); in security_file_ioctl_compat() 1644 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_fcntl() argument 1646 return call_int_hook(file_fcntl, 0, file, cmd, arg); in security_file_fcntl()
|