/security/apparmor/ |
D | procattr.c | 76 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 80 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 81 if ((name == args) || *name != '^') { in split_token_from_name() 82 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name() 100 int aa_setprocattr_changehat(char *args, size_t size, int flags) in aa_setprocattr_changehat() argument 107 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat() 123 char *end = args + size; in aa_setprocattr_changehat()
|
D | lsm.c | 647 char *command, *largs = NULL, *args = value; in apparmor_setprocattr() local 656 if (args[size - 1] != '\0') { in apparmor_setprocattr() 658 largs = args = kmalloc(size + 1, GFP_KERNEL); in apparmor_setprocattr() 659 if (!args) in apparmor_setprocattr() 661 memcpy(args, value, size); in apparmor_setprocattr() 662 args[size] = '\0'; in apparmor_setprocattr() 666 args = strim(args); in apparmor_setprocattr() 667 command = strsep(&args, " "); in apparmor_setprocattr() 668 if (!args) in apparmor_setprocattr() 670 args = skip_spaces(args); in apparmor_setprocattr() [all …]
|
/security/apparmor/include/ |
D | lib.h | 31 #define AA_DEBUG(fmt, args...) \ argument 34 pr_debug_ratelimited("AppArmor: " fmt, ##args); \ 39 #define AA_BUG(X, args...) \ argument 42 AA_BUG_FMT((X), "" args); \ 46 #define AA_BUG_FMT(X, fmt, args...) \ argument 47 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args) 49 #define AA_BUG_FMT(X, fmt, args...) no_printk(fmt, ##args) argument 52 #define AA_ERROR(fmt, args...) \ argument 53 pr_err_ratelimited("AppArmor: " fmt, ##args) 60 char *aa_split_fqname(char *args, char **ns_name);
|
D | perms.h | 107 #define xcheck_ns_profile_profile(P1, P2, FN, args...) \ argument 111 ____e = FN((P1), (P2), args); \ 115 #define xcheck_ns_profile_label(P, L, FN, args...) \ argument 119 xcheck_ns_profile_profile((P), __p2, (FN), args)); \ 122 #define xcheck_ns_labels(L1, L2, FN, args...) \ argument 125 fn_for_each((L1), __p1, FN(__p1, (L2), args)); \ 129 #define xcheck_labels_profiles(L1, L2, FN, args...) \ argument 130 xcheck_ns_labels((L1), (L2), xcheck_ns_profile_label, (FN), args)
|
D | procattr.h | 15 int aa_setprocattr_changehat(char *args, size_t size, int flags);
|
/security/integrity/ima/ |
D | ima_policy.c | 1102 substring_t *args, int lsm_rule, int audit_type) in ima_lsm_rule_init() argument 1109 entry->lsm[lsm_rule].args_p = match_strdup(args); in ima_lsm_rule_init() 1398 substring_t args[MAX_OPT_ARGS]; in ima_parse_rule() local 1406 token = match_token(p, policy_tokens, args); in ima_parse_rule() 1465 ima_log_string(ab, "func", args[0].from); in ima_parse_rule() 1470 if (strcmp(args[0].from, "FILE_CHECK") == 0) in ima_parse_rule() 1473 else if (strcmp(args[0].from, "PATH_CHECK") == 0) in ima_parse_rule() 1475 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) in ima_parse_rule() 1477 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) in ima_parse_rule() 1479 else if ((strcmp(args[0].from, "FILE_MMAP") == 0) in ima_parse_rule() [all …]
|
/security/selinux/ss/ |
D | hashtab.c | 87 int (*apply)(void *k, void *d, void *args), in hashtab_map() argument 88 void *args) in hashtab_map() 97 ret = apply(cur->key, cur->datum, args); in hashtab_map() 135 struct hashtab_node *orig, void *args), in hashtab_duplicate() argument 136 int (*destroy)(void *k, void *d, void *args), in hashtab_duplicate() 137 void *args) in hashtab_duplicate() 157 rc = copy(tmp, cur, args); in hashtab_duplicate() 178 destroy(cur->key, cur->datum, args); in hashtab_duplicate()
|
D | hashtab.h | 136 int (*apply)(void *k, void *d, void *args), 137 void *args); 141 struct hashtab_node *orig, void *args), 142 int (*destroy)(void *k, void *d, void *args), 143 void *args);
|
D | services.c | 80 struct convert_context_args args; member 451 static int dump_masked_av_helper(void *k, void *d, void *args) in dump_masked_av_helper() argument 454 char **permission_names = args; in dump_masked_av_helper() 2030 struct convert_context_args *args; in convert_context() local 2039 args = p; in convert_context() 2046 rc = string_to_context_struct(args->newp, NULL, s, in convert_context() 2077 usrdatum = symtab_search(&args->newp->p_users, in convert_context() 2078 sym_name(args->oldp, in convert_context() 2085 role = symtab_search(&args->newp->p_roles, in convert_context() 2086 sym_name(args->oldp, SYM_ROLES, oldc->role - 1)); in convert_context() [all …]
|
D | sidtab.h | 68 int (*func)(struct context *oldc, struct context *newc, void *args, gfp_t gfp_flags); 69 void *args; member
|
D | conditional.c | 679 static int cond_bools_destroy(void *key, void *datum, void *args) in cond_bools_destroy() argument 686 static int cond_bools_copy(struct hashtab_node *new, struct hashtab_node *orig, void *args) in cond_bools_copy() argument 700 static int cond_bools_index(void *key, void *datum, void *args) in cond_bools_index() argument 705 cond_bool_array = args; in cond_bools_index()
|
D | sidtab.c | 328 convert->args, GFP_ATOMIC); in sidtab_context_to_sid() 407 convert->args, GFP_KERNEL); in sidtab_convert_tree()
|
/security/tomoyo/ |
D | audit.c | 245 va_list args) in tomoyo_init_log() argument 290 vsnprintf(buf + pos, len - pos, fmt, args); in tomoyo_init_log() 367 va_list args) in tomoyo_write_log2() argument 376 buf = tomoyo_init_log(r, len, fmt, args); in tomoyo_write_log2() 422 va_list args; in tomoyo_write_log() local 425 va_start(args, fmt); in tomoyo_write_log() 426 len = vsnprintf(NULL, 0, fmt, args) + 1; in tomoyo_write_log() 427 va_end(args); in tomoyo_write_log() 428 va_start(args, fmt); in tomoyo_write_log() 429 tomoyo_write_log2(r, len, fmt, args); in tomoyo_write_log() [all …]
|
D | common.c | 189 va_list args; in tomoyo_addprintf() local 192 va_start(args, fmt); in tomoyo_addprintf() 193 vsnprintf(buffer + pos, len - pos - 1, fmt, args); in tomoyo_addprintf() 194 va_end(args); in tomoyo_addprintf() 271 va_list args; in tomoyo_io_printf() local 278 va_start(args, fmt); in tomoyo_io_printf() 279 len = vsnprintf(head->read_buf + pos, size, fmt, args) + 1; in tomoyo_io_printf() 280 va_end(args); in tomoyo_io_printf() 2052 va_list args; in tomoyo_supervisor() local 2059 va_start(args, fmt); in tomoyo_supervisor() [all …]
|
D | common.h | 957 va_list args); 1070 va_list args);
|
/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 735 substring_t args[MAX_OPT_ARGS]; in getoptions() local 758 token = match_token(p, key_tokens, args); in getoptions() 764 opt->pcrinfo_len = strlen(args[0].from) / 2; in getoptions() 767 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions() 773 res = kstrtoul(args[0].from, 16, &handle); in getoptions() 780 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) in getoptions() 782 res = hex2bin(opt->keyauth, args[0].from, in getoptions() 793 opt->blobauth_len = strlen(args[0].from); in getoptions() 796 res = hex2bin(opt->blobauth, args[0].from, in getoptions() 806 memcpy(opt->blobauth, args[0].from, in getoptions() [all …]
|
D | trusted_core.c | 75 substring_t args[MAX_OPT_ARGS]; in datablob_parse() local 85 key_cmd = match_token(c, key_tokens, args); in datablob_parse()
|
/security/keys/ |
D | keyctl_pkey.c | 41 substring_t args[MAX_OPT_ARGS]; in keyctl_pkey_params_parse() local 48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse() 53 q = args[0].from; in keyctl_pkey_params_parse()
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 180 substring_t args[MAX_OPT_ARGS]; in datablob_parse() local 191 key_cmd = match_token(keyword, key_tokens, args); in datablob_parse() 200 key_format = match_token(p, key_format_tokens, args); in datablob_parse()
|