/security/apparmor/ |
D | Makefile | 62 $(call cmd,make-caps) 65 $(call cmd,make-rlim)
|
D | lsm.c | 459 static int apparmor_file_lock(struct file *file, unsigned int cmd) in apparmor_file_lock() argument 463 if (cmd == F_WRLCK) in apparmor_file_lock()
|
/security/tomoyo/ |
D | tomoyo.c | 312 static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, in tomoyo_file_fcntl() argument 315 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) in tomoyo_file_fcntl() 347 static int tomoyo_file_ioctl(struct file *file, unsigned int cmd, in tomoyo_file_ioctl() argument 350 return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd); in tomoyo_file_ioctl()
|
/security/ |
D | security.c | 697 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_ioctl() argument 699 return security_ops->file_ioctl(file, cmd, arg); in security_file_ioctl() 758 int security_file_lock(struct file *file, unsigned int cmd) in security_file_lock() argument 760 return security_ops->file_lock(file, cmd); in security_file_lock() 763 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_fcntl() argument 765 return security_ops->file_fcntl(file, cmd, arg); in security_file_fcntl() 979 int security_msg_queue_msgctl(struct msg_queue *msq, int cmd) in security_msg_queue_msgctl() argument 981 return security_ops->msg_queue_msgctl(msq, cmd); in security_msg_queue_msgctl() 1011 int security_shm_shmctl(struct shmid_kernel *shp, int cmd) in security_shm_shmctl() argument 1013 return security_ops->shm_shmctl(shp, cmd); in security_shm_shmctl() [all …]
|
D | capability.c | 345 static int cap_file_lock(struct file *file, unsigned int cmd) in cap_file_lock() argument 350 static int cap_file_fcntl(struct file *file, unsigned int cmd, in cap_file_fcntl() argument 513 static int cap_msg_queue_msgctl(struct msg_queue *msq, int cmd) in cap_msg_queue_msgctl() argument 544 static int cap_shm_shmctl(struct shmid_kernel *shp, int cmd) in cap_shm_shmctl() argument 569 static int cap_sem_semctl(struct sem_array *sma, int cmd) in cap_sem_semctl() argument
|
D | lsm_audit.c | 260 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); in dump_common_audit_data()
|
/security/smack/ |
D | smack_lsm.c | 1099 static int smack_file_ioctl(struct file *file, unsigned int cmd, in smack_file_ioctl() argument 1108 if (_IOC_DIR(cmd) & _IOC_WRITE) in smack_file_ioctl() 1111 if (rc == 0 && (_IOC_DIR(cmd) & _IOC_READ)) in smack_file_ioctl() 1124 static int smack_file_lock(struct file *file, unsigned int cmd) in smack_file_lock() argument 1145 static int smack_file_fcntl(struct file *file, unsigned int cmd, in smack_file_fcntl() argument 1152 switch (cmd) { in smack_file_fcntl() 2108 static int smack_shm_shmctl(struct shmid_kernel *shp, int cmd) in smack_shm_shmctl() argument 2112 switch (cmd) { in smack_shm_shmctl() 2231 static int smack_sem_semctl(struct sem_array *sma, int cmd) in smack_sem_semctl() argument 2235 switch (cmd) { in smack_sem_semctl() [all …]
|
/security/keys/ |
D | trusted.c | 357 static int trusted_tpm_send(const u32 chip_num, unsigned char *cmd, in trusted_tpm_send() argument 362 dump_tpm_buf(cmd); in trusted_tpm_send() 363 rc = tpm_send(chip_num, cmd, buflen); in trusted_tpm_send() 364 dump_tpm_buf(cmd); in trusted_tpm_send()
|
/security/selinux/ |
D | hooks.c | 3118 u32 requested, u16 cmd) in ioctl_has_perm() argument 3127 u8 driver = cmd >> 8; in ioctl_has_perm() 3128 u8 xperm = cmd & 0xff; in ioctl_has_perm() 3132 ad.u.op->cmd = cmd; in ioctl_has_perm() 3153 static int selinux_file_ioctl(struct file *file, unsigned int cmd, in selinux_file_ioctl() argument 3159 switch (cmd) { in selinux_file_ioctl() 3195 error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); in selinux_file_ioctl() 3301 static int selinux_file_lock(struct file *file, unsigned int cmd) in selinux_file_lock() argument 3308 static int selinux_file_fcntl(struct file *file, unsigned int cmd, in selinux_file_fcntl() argument 3314 switch (cmd) { in selinux_file_fcntl() [all …]
|