Home
last modified time | relevance | path

Searched refs:t (Results 1 – 8 of 8) sorted by relevance

/security/apparmor/
Dapparmorfs.c107 char *t = target; in mangle_name() local
115 *(t)++ = '.'; in mangle_name()
117 *(t)++ = '_'; in mangle_name()
119 *(t)++ = *name; in mangle_name()
122 *t = 0; in mangle_name()
134 return t - target; in mangle_name()
820 struct multi_transaction *t; in multi_transaction_kref() local
822 t = container_of(kref, struct multi_transaction, count); in multi_transaction_kref()
823 free_page((unsigned long) t); in multi_transaction_kref()
827 get_multi_transaction(struct multi_transaction *t) in get_multi_transaction() argument
[all …]
/security/smack/
Dsmack.h394 const struct task_struct *t) in smk_of_task_struct_subj() argument
401 cred = rcu_dereference(t->cred); in smk_of_task_struct_subj()
410 const struct task_struct *t) in smk_of_task_struct_obj() argument
417 cred = __task_cred(t); in smk_of_task_struct_obj()
477 struct task_struct *t) in smk_ad_setfield_u_tsk() argument
479 a->a.u.tsk = t; in smk_ad_setfield_u_tsk()
509 struct task_struct *t) in smk_ad_setfield_u_tsk() argument
/security/keys/
Drequest_key.c39 struct task_struct *t = current; in cache_requested_key() local
42 if (!(t->flags & PF_KTHREAD)) { in cache_requested_key()
43 key_put(t->cached_requested_key); in cache_requested_key()
44 t->cached_requested_key = key_get(key); in cache_requested_key()
45 set_tsk_thread_flag(t, TIF_NOTIFY_RESUME); in cache_requested_key()
DKconfig29 call that didn't upcall to the kernel to be cached temporarily in the
/security/selinux/ss/
Dpolicydb.c1175 static void type_set_init(struct type_set *t) in type_set_init() argument
1177 ebitmap_init(&t->types); in type_set_init()
1178 ebitmap_init(&t->negset); in type_set_init()
1181 static int type_set_read(struct type_set *t, void *fp) in type_set_read() argument
1186 if (ebitmap_read(&t->types, fp)) in type_set_read()
1188 if (ebitmap_read(&t->negset, fp)) in type_set_read()
1194 t->flags = le32_to_cpu(buf[0]); in type_set_read()
2983 static int type_set_write(struct type_set *t, void *fp) in type_set_write() argument
2988 if (ebitmap_write(&t->types, fp)) in type_set_write()
2990 if (ebitmap_write(&t->negset, fp)) in type_set_write()
[all …]
Dservices.c735 char *o = NULL, *n = NULL, *t = NULL; in security_validtrans_handle_fail() local
742 if (sidtab_entry_to_string(p, sidtab, tentry, &t, &tlen)) in security_validtrans_handle_fail()
747 o, n, t, sym_name(p, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail()
751 kfree(t); in security_validtrans_handle_fail()
1667 char *s = NULL, *t = NULL, *n = NULL; in compute_sid_handle_invalid_context() local
1673 if (sidtab_entry_to_string(policydb, sidtab, tentry, &t, &tlen)) in compute_sid_handle_invalid_context()
1685 s, t, sym_name(policydb, SYM_CLASSES, tclass-1)); in compute_sid_handle_invalid_context()
1689 kfree(t); in compute_sid_handle_invalid_context()
/security/tomoyo/
DKconfig40 If you don't need audit logs, you may set this value to 0.
/security/
DKconfig247 in old kernel configs to CONFIG_LSM in new kernel configs. Don't