Home
last modified time | relevance | path

Searched refs:value (Results 1 – 25 of 34) sorted by relevance

12

/security/tomoyo/
Dcondition.c40 result = tomoyo_path_matches_pattern(&arg, argv->value); in tomoyo_argv()
66 struct tomoyo_path_info value; in tomoyo_envp() local
70 value.name = env_value; in tomoyo_envp()
71 tomoyo_fill_path_info(&value); in tomoyo_envp()
78 if (envp->value) { in tomoyo_envp()
79 result = tomoyo_path_matches_pattern(&value, in tomoyo_envp()
80 envp->value); in tomoyo_envp()
213 if ((!envp->value && !envp->is_not) || in tomoyo_scan_bprm()
214 (envp->value && envp->is_not)) in tomoyo_scan_bprm()
305 argv->value = tomoyo_get_dqword(right); in tomoyo_parse_argv()
[all …]
DKconfig24 This is the default value for maximal ACL entries
37 This is the default value for maximal entries for
40 If you don't need audit logs, you may set this value to 0.
Dcommon.h609 const struct tomoyo_path_info *value; member
616 const struct tomoyo_path_info *value; member
929 bool tomoyo_compare_number_union(const unsigned long value,
962 const char *tomoyo_yesno(const unsigned int value);
1062 const unsigned long value, const u8 type);
Dutil.c227 const unsigned long value, const u8 type) in tomoyo_print_ulong() argument
230 snprintf(buffer, buffer_len, "%lu", value); in tomoyo_print_ulong()
232 snprintf(buffer, buffer_len, "0%lo", value); in tomoyo_print_ulong()
234 snprintf(buffer, buffer_len, "0x%lX", value); in tomoyo_print_ulong()
Dfile.c112 bool tomoyo_compare_number_union(const unsigned long value, in tomoyo_compare_number_union() argument
116 return tomoyo_number_matches_group(value, value, ptr->group); in tomoyo_compare_number_union()
117 return value >= ptr->values[0] && value <= ptr->values[1]; in tomoyo_compare_number_union()
Dcommon.c182 const char *tomoyo_yesno(const unsigned int value) in tomoyo_yesno() argument
184 return value ? "yes" : "no"; in tomoyo_yesno()
594 static int tomoyo_set_mode(char *name, const char *value, in tomoyo_set_mode() argument
629 if (strstr(value, "use_default")) { in tomoyo_set_mode()
635 if (strstr(value, tomoyo_mode[mode])) in tomoyo_set_mode()
642 switch (tomoyo_find_yesno(value, "grant_log")) { in tomoyo_set_mode()
650 switch (tomoyo_find_yesno(value, "reject_log")) { in tomoyo_set_mode()
1301 argv->value->name); in tomoyo_print_condition()
1311 if (envp->value) { in tomoyo_print_condition()
1313 tomoyo_set_string(head, envp->value->name); in tomoyo_print_condition()
Dgc.c303 tomoyo_put_name(argv->value); in tomoyo_del_condition()
306 tomoyo_put_name(envp->value); in tomoyo_del_condition()
/security/selinux/ss/
Dpolicydb.h42 u32 value; /* permission bit + 1 */ member
47 u32 value; /* internal common value */ member
53 u32 value; /* class value */ member
78 u32 value; /* internal role value */ member
114 u32 value; /* internal type value */ member
122 u32 value; /* internal user value */ member
138 u32 value; /* internal category bit + 1 */ member
150 __u32 value; /* internal type value */ member
Dpolicydb.c394 role->value = ++p->p_roles.nprim; in roles_init()
395 if (role->value != OBJECT_R_VAL) in roles_init()
561 if (!comdatum->value || comdatum->value > p->p_commons.nprim) in common_index()
564 p->sym_val_to_name[SYM_COMMONS][comdatum->value - 1] = key; in common_index()
576 if (!cladatum->value || cladatum->value > p->p_classes.nprim) in class_index()
579 p->sym_val_to_name[SYM_CLASSES][cladatum->value - 1] = key; in class_index()
580 p->class_val_to_struct[cladatum->value - 1] = cladatum; in class_index()
591 if (!role->value in role_index()
592 || role->value > p->p_roles.nprim in role_index()
596 p->sym_val_to_name[SYM_ROLES][role->value - 1] = key; in role_index()
[all …]
Dmls.c320 catdatum->value - 1, 1); in mls_context_to_sid()
332 if (catdatum->value >= rngdatum->value) in mls_context_to_sid()
335 for (i = catdatum->value; i < rngdatum->value; i++) { in mls_context_to_sid()
479 catdatum->value - 1, 1); in mls_convert_context()
Dservices.c135 p_out->value = string_to_security_class(pol, p_in->name); in selinux_set_mapping()
136 if (!p_out->value) { in selinux_set_mapping()
153 p_out->perms[k] = string_to_av_perm(pol, p_out->value, in selinux_set_mapping()
187 return map->mapping[tclass].value; in unmap_class()
200 if (map->mapping[i].value == pol_value) in map_class()
456 BUG_ON(pdatum->value < 1 || pdatum->value > 32); in dump_masked_av_helper()
458 permission_names[pdatum->value - 1] = (char *)k; in dump_masked_av_helper()
1473 ctx->user = usrdatum->value; in string_to_context_struct()
1488 ctx->role = role->value; in string_to_context_struct()
1501 ctx->type = typdatum->value; in string_to_context_struct()
[all …]
Dconditional.c192 if (!booldatum->value || booldatum->value > p->p_bools.nprim) in cond_index_bool()
195 p->sym_val_to_name[SYM_BOOLS][booldatum->value - 1] = key; in cond_index_bool()
196 p->bool_val_to_struct[booldatum->value - 1] = booldatum; in cond_index_bool()
224 booldatum->value = le32_to_cpu(buf[0]); in cond_read_bool()
460 buf[0] = cpu_to_le32(booldatum->value); in cond_write_bool()
708 cond_bool_array[booldatum->value - 1] = booldatum; in cond_bools_index()
Dservices.h14 u16 value; /* policy value for class */ member
Debitmap.c278 int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value) in ebitmap_set_bit() argument
286 if (value) { in ebitmap_set_bit()
321 if (!value) in ebitmap_set_bit()
Debitmap.h130 int ebitmap_set_bit(struct ebitmap *e, unsigned long bit, int value);
/security/keys/trusted-keys/
Dtrusted_tpm2.c131 const void *value, size_t vlen) in tpm2_key_parent() argument
134 const u8 *v = value; in tpm2_key_parent()
148 const void *value, size_t vlen) in tpm2_key_type() argument
150 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type()
155 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type()
166 const void *value, size_t vlen) in tpm2_key_pub() argument
170 ctx->pub = value; in tpm2_key_pub()
178 const void *value, size_t vlen) in tpm2_key_priv() argument
182 ctx->priv = value; in tpm2_key_priv()
/security/selinux/include/
Dsecurity.h133 static inline void enforcing_set(struct selinux_state *state, bool value) in enforcing_set() argument
135 WRITE_ONCE(state->enforcing, value); in enforcing_set()
143 static inline void enforcing_set(struct selinux_state *state, bool value) in enforcing_set() argument
153 static inline void checkreqprot_set(struct selinux_state *state, bool value) in checkreqprot_set() argument
155 WRITE_ONCE(state->checkreqprot, value); in checkreqprot_set()
/security/selinux/
DKconfig74 int "NSA SELinux checkreqprot default value"
79 This option sets the default value for the 'checkreqprot' flag
105 chain lengths are high (e.g. > 20) then selecting a higher value here
117 If unsure, keep the default value.
/security/
Dsecurity.c1106 &lsm_xattr->value, in security_inode_init_security()
1117 for (xattr = new_xattrs; xattr->value != NULL; xattr++) in security_inode_init_security()
1118 kfree(xattr->value); in security_inode_init_security()
1133 void **value, size_t *len) in security_old_inode_init_security() argument
1138 qstr, name, value, len); in security_old_inode_init_security()
1354 const void *value, size_t size, int flags) in security_inode_setxattr() argument
1364 ret = call_int_hook(inode_setxattr, 1, mnt_userns, dentry, name, value, in security_inode_setxattr()
1368 ret = cap_inode_setxattr(dentry, name, value, size, flags); in security_inode_setxattr()
1371 ret = ima_inode_setxattr(dentry, name, value, size); in security_inode_setxattr()
1374 return evm_inode_setxattr(mnt_userns, dentry, name, value, size); in security_inode_setxattr()
[all …]
DKconfig.hardening114 with a specific debug value. This is intended to eliminate
132 with a zero value. This is intended to eliminate all
162 the stack initialized to the poison value, which both reduces
190 If unsure, leave the default value 100.
/security/apparmor/
Dresource.c53 unsigned long value, struct aa_label *peer, in audit_resource() argument
59 aad(&sa)->rlim.max = value; in audit_resource()
Dlsm.c598 char **value) in apparmor_getprocattr() argument
616 error = aa_getprocattr(label, value); in apparmor_getprocattr()
624 static int apparmor_setprocattr(const char *name, void *value, in apparmor_setprocattr() argument
627 char *command, *largs = NULL, *args = value; in apparmor_setprocattr()
641 memcpy(args, value, size); in apparmor_setprocattr()
654 arg_size = size - (args - (largs ? largs : (char *) value)); in apparmor_setprocattr()
1467 bool value; in param_set_aaintbool() local
1474 value = !!*((int *)kp->arg); in param_set_aaintbool()
1476 kp_local.arg = &value; in param_set_aaintbool()
1493 bool value; in param_get_aaintbool() local
[all …]
Ddomain.c317 char *value = NULL; in aa_xattrs_match() local
330 &value, value_size, GFP_KERNEL); in aa_xattrs_match()
341 state = aa_dfa_match_len(profile->xmatch, state, value, in aa_xattrs_match()
367 kfree(value); in aa_xattrs_match()
/security/smack/
Dsmack_lsm.c956 void **value, size_t *len) in smack_inode_init_security() argument
968 if (value && len) { in smack_inode_init_security()
1000 *value = kstrdup(isp->smk_known, GFP_NOFS); in smack_inode_init_security()
1001 if (*value == NULL) in smack_inode_init_security()
1243 const void *value, size_t size, int flags) in smack_inode_setxattr() argument
1268 strncmp(value, TRANS_TRUE, TRANS_TRUE_SIZE) != 0) in smack_inode_setxattr()
1271 rc = cap_inode_setxattr(dentry, name, value, size, flags); in smack_inode_setxattr()
1277 skp = size ? smk_import_entry(value, size) : NULL; in smack_inode_setxattr()
1308 const void *value, size_t size, int flags) in smack_inode_post_setxattr() argument
1319 skp = smk_import_entry(value, size); in smack_inode_post_setxattr()
[all …]
/security/integrity/evm/
DKconfig23 Default value is 'selected', which is former version 2.

12