Searched refs:t (Results 1 – 8 of 8) sorted by relevance
/security/apparmor/ |
D | apparmorfs.c | 107 char *t = target; in mangle_name() local 115 *(t)++ = '.'; in mangle_name() 117 *(t)++ = '_'; in mangle_name() 119 *(t)++ = *name; in mangle_name() 122 *t = 0; in mangle_name() 134 return t - target; in mangle_name() 820 struct multi_transaction *t; in multi_transaction_kref() local 822 t = container_of(kref, struct multi_transaction, count); in multi_transaction_kref() 823 free_page((unsigned long) t); in multi_transaction_kref() 827 get_multi_transaction(struct multi_transaction *t) in get_multi_transaction() argument [all …]
|
/security/smack/ |
D | smack.h | 394 const struct task_struct *t) in smk_of_task_struct_subj() argument 401 cred = rcu_dereference(t->cred); in smk_of_task_struct_subj() 410 const struct task_struct *t) in smk_of_task_struct_obj() argument 417 cred = __task_cred(t); in smk_of_task_struct_obj() 477 struct task_struct *t) in smk_ad_setfield_u_tsk() argument 479 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 509 struct task_struct *t) in smk_ad_setfield_u_tsk() argument
|
/security/keys/ |
D | request_key.c | 39 struct task_struct *t = current; in cache_requested_key() local 42 if (!(t->flags & PF_KTHREAD)) { in cache_requested_key() 43 key_put(t->cached_requested_key); in cache_requested_key() 44 t->cached_requested_key = key_get(key); in cache_requested_key() 45 set_tsk_thread_flag(t, TIF_NOTIFY_RESUME); in cache_requested_key()
|
D | Kconfig | 29 call that didn't upcall to the kernel to be cached temporarily in the
|
/security/selinux/ss/ |
D | policydb.c | 1175 static void type_set_init(struct type_set *t) in type_set_init() argument 1177 ebitmap_init(&t->types); in type_set_init() 1178 ebitmap_init(&t->negset); in type_set_init() 1181 static int type_set_read(struct type_set *t, void *fp) in type_set_read() argument 1186 if (ebitmap_read(&t->types, fp)) in type_set_read() 1188 if (ebitmap_read(&t->negset, fp)) in type_set_read() 1194 t->flags = le32_to_cpu(buf[0]); in type_set_read() 2983 static int type_set_write(struct type_set *t, void *fp) in type_set_write() argument 2988 if (ebitmap_write(&t->types, fp)) in type_set_write() 2990 if (ebitmap_write(&t->negset, fp)) in type_set_write() [all …]
|
D | services.c | 735 char *o = NULL, *n = NULL, *t = NULL; in security_validtrans_handle_fail() local 742 if (sidtab_entry_to_string(p, sidtab, tentry, &t, &tlen)) in security_validtrans_handle_fail() 747 o, n, t, sym_name(p, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail() 751 kfree(t); in security_validtrans_handle_fail() 1667 char *s = NULL, *t = NULL, *n = NULL; in compute_sid_handle_invalid_context() local 1673 if (sidtab_entry_to_string(policydb, sidtab, tentry, &t, &tlen)) in compute_sid_handle_invalid_context() 1685 s, t, sym_name(policydb, SYM_CLASSES, tclass-1)); in compute_sid_handle_invalid_context() 1689 kfree(t); in compute_sid_handle_invalid_context()
|
/security/tomoyo/ |
D | Kconfig | 40 If you don't need audit logs, you may set this value to 0.
|
/security/ |
D | Kconfig | 247 in old kernel configs to CONFIG_LSM in new kernel configs. Don't
|