Home
last modified time | relevance | path

Searched refs:op (Results 1 – 25 of 31) sorted by relevance

12

/security/integrity/ima/
Dima_api.c95 static const char op[] = "add_template_measure"; in ima_store_template() local
114 template_name, op, in ima_store_template()
120 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
132 const char *op, const char *cause) in ima_add_violation() argument
153 op, cause, result, 0); in ima_add_violation()
266 static const char op[] = "add_template_measure"; in ima_store_measurement() local
280 op, audit_cause, result, 0); in ima_store_measurement()
Dima.h98 const char *op, struct inode *inode,
106 const char *op, const char *cause);
234 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument
240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
Dima_init.c48 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local
89 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
Dima_queue.c109 const char *op, struct inode *inode, in ima_add_template_entry() argument
148 op, audit_cause, result, audit_info); in ima_add_template_entry()
Dima_policy.c374 static const char op[] = "policy_update"; in ima_update_policy() local
386 NULL, op, cause, result, audit_info); in ima_update_policy()
712 static const char op[] = "update_policy"; in ima_parse_add_rule() local
721 NULL, op, "already-exists", in ima_parse_add_rule()
729 NULL, op, "-ENOMEM", -ENOMEM, audit_info); in ima_parse_add_rule()
747 NULL, op, "invalid-policy", result, in ima_parse_add_rule()
Dima_appraise.c190 static const char op[] = "appraise_data"; in ima_appraise_measurement() local
280 op, cause, rc, 0); in ima_appraise_measurement()
/security/apparmor/
Dlsm.c162 static int common_perm(int op, struct path *path, u32 mask, in common_perm() argument
170 error = aa_path_perm(op, profile, path, 0, mask, cond); in common_perm()
185 static int common_perm_dir_dentry(int op, struct path *dir, in common_perm_dir_dentry() argument
191 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry()
203 static int common_perm_mnt_dentry(int op, struct vfsmount *mnt, in common_perm_mnt_dentry() argument
211 return common_perm(op, &path, mask, &cond); in common_perm_mnt_dentry()
223 static int common_perm_rm(int op, struct path *dir, in common_perm_rm() argument
235 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm()
248 static int common_perm_create(int op, struct path *dir, struct dentry *dentry, in common_perm_create() argument
256 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create()
[all …]
Dfile.c107 gfp_t gfp, int op, u32 request, const char *name, in aa_audit_file() argument
115 aad.op = op, in aa_audit_file()
278 int aa_path_perm(int op, struct aa_profile *profile, struct path *path, in aa_path_perm() argument
303 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, name, in aa_path_perm()
448 int aa_file_perm(int op, struct aa_profile *profile, struct file *file, in aa_file_perm() argument
456 return aa_path_perm(op, profile, &file->f_path, PATH_DELEGATE_DELETED, in aa_file_perm()
Dpolicy.c903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, in audit_policy() argument
910 aad.op = op; in audit_policy()
925 bool aa_may_manage_policy(int op) in aa_may_manage_policy() argument
929 audit_policy(op, GFP_KERNEL, NULL, "policy_locked", -EACCES); in aa_may_manage_policy()
934 audit_policy(op, GFP_KERNEL, NULL, "not policy admin", -EACCES); in aa_may_manage_policy()
1073 int op = OP_PROF_REPL; in aa_replace_profiles() local
1164 op = (!ent->old && !ent->rename) ? OP_PROF_LOAD : OP_PROF_REPL; in aa_replace_profiles()
1166 audit_policy(op, GFP_ATOMIC, ent->new->base.name, NULL, error); in aa_replace_profiles()
1218 error = audit_policy(op, GFP_KERNEL, name, info, error); in aa_replace_profiles()
Dprocattr.c90 static char *split_token_from_name(int op, char *args, u64 * token) in split_token_from_name() argument
96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args); in split_token_from_name()
Daudit.c120 if (sa->aad->op) { in audit_pre()
122 audit_log_string(ab, op_table[sa->aad->op]); in audit_pre()
Ddomain.c755 int op, error = 0; in aa_change_profile() local
763 op = OP_CHANGE_ONEXEC; in aa_change_profile()
766 op = OP_CHANGE_PROFILE; in aa_change_profile()
846 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, in aa_change_profile()
Dipc.c47 aad.op = OP_PTRACE; in aa_audit_ptrace()
Dcapability.c74 sa.aad->op = OP_CAPABLE; in audit_caps()
Dresource.c58 aad.op = OP_SETRLIMIT, in audit_resource()
/security/selinux/include/
Daudit.h32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
54 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule,
/security/integrity/
Dintegrity_audit.c32 const unsigned char *fname, const char *op, in integrity_audit_msg() argument
49 audit_log_string(ab, op); in integrity_audit_msg()
Dintegrity.h163 const unsigned char *fname, const char *op,
168 const char *op, const char *cause, in integrity_audit_msg() argument
/security/apparmor/include/
Dfile.h148 gfp_t gfp, int op, u32 request, const char *name,
174 int aa_path_perm(int op, struct aa_profile *profile, struct path *path,
180 int aa_file_perm(int op, struct aa_profile *profile, struct file *file,
Daudit.h107 int op; member
/security/smack/
Dsmack_lsm.c552 char *op; in smack_sb_kern_mount() local
562 for (op = data; op != NULL; op = commap) { in smack_sb_kern_mount()
563 commap = strchr(op, ','); in smack_sb_kern_mount()
567 if (strncmp(op, SMK_FSHAT, strlen(SMK_FSHAT)) == 0) { in smack_sb_kern_mount()
568 op += strlen(SMK_FSHAT); in smack_sb_kern_mount()
569 skp = smk_import_entry(op, 0); in smack_sb_kern_mount()
574 } else if (strncmp(op, SMK_FSFLOOR, strlen(SMK_FSFLOOR)) == 0) { in smack_sb_kern_mount()
575 op += strlen(SMK_FSFLOOR); in smack_sb_kern_mount()
576 skp = smk_import_entry(op, 0); in smack_sb_kern_mount()
581 } else if (strncmp(op, SMK_FSDEFAULT, in smack_sb_kern_mount()
[all …]
/security/selinux/ss/
Dconstraint.h48 u32 op; /* operator */ member
Dservices.c318 switch (e->op) { in constraint_expr_eval()
362 switch (e->op) { in constraint_expr_eval()
388 switch (e->op) { in constraint_expr_eval()
424 switch (e->op) { in constraint_expr_eval()
3026 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3048 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init()
3147 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, in selinux_audit_rule_match() argument
3180 switch (op) { in selinux_audit_rule_match()
3191 switch (op) { in selinux_audit_rule_match()
3202 switch (op) { in selinux_audit_rule_match()
[all …]
/security/
Dlsm_audit.c251 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data()
253 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data()
260 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); in dump_common_audit_data()
/security/keys/
Drequest_key.c95 const char *op, in call_sbin_request_key() argument
107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); in call_sbin_request_key()
165 argv[i++] = (char *) op; in call_sbin_request_key()

12