/security/integrity/ima/ |
D | ima_api.c | 95 static const char op[] = "add_template_measure"; in ima_store_template() local 114 template_name, op, in ima_store_template() 120 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template() 132 const char *op, const char *cause) in ima_add_violation() argument 153 op, cause, result, 0); in ima_add_violation() 266 static const char op[] = "add_template_measure"; in ima_store_measurement() local 280 op, audit_cause, result, 0); in ima_store_measurement()
|
D | ima.h | 98 const char *op, struct inode *inode, 106 const char *op, const char *cause); 234 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument 240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
D | ima_init.c | 48 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local 89 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
|
D | ima_queue.c | 109 const char *op, struct inode *inode, in ima_add_template_entry() argument 148 op, audit_cause, result, audit_info); in ima_add_template_entry()
|
D | ima_policy.c | 374 static const char op[] = "policy_update"; in ima_update_policy() local 386 NULL, op, cause, result, audit_info); in ima_update_policy() 712 static const char op[] = "update_policy"; in ima_parse_add_rule() local 721 NULL, op, "already-exists", in ima_parse_add_rule() 729 NULL, op, "-ENOMEM", -ENOMEM, audit_info); in ima_parse_add_rule() 747 NULL, op, "invalid-policy", result, in ima_parse_add_rule()
|
D | ima_appraise.c | 190 static const char op[] = "appraise_data"; in ima_appraise_measurement() local 280 op, cause, rc, 0); in ima_appraise_measurement()
|
/security/apparmor/ |
D | lsm.c | 162 static int common_perm(int op, struct path *path, u32 mask, in common_perm() argument 170 error = aa_path_perm(op, profile, path, 0, mask, cond); in common_perm() 185 static int common_perm_dir_dentry(int op, struct path *dir, in common_perm_dir_dentry() argument 191 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry() 203 static int common_perm_mnt_dentry(int op, struct vfsmount *mnt, in common_perm_mnt_dentry() argument 211 return common_perm(op, &path, mask, &cond); in common_perm_mnt_dentry() 223 static int common_perm_rm(int op, struct path *dir, in common_perm_rm() argument 235 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm() 248 static int common_perm_create(int op, struct path *dir, struct dentry *dentry, in common_perm_create() argument 256 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create() [all …]
|
D | file.c | 107 gfp_t gfp, int op, u32 request, const char *name, in aa_audit_file() argument 115 aad.op = op, in aa_audit_file() 278 int aa_path_perm(int op, struct aa_profile *profile, struct path *path, in aa_path_perm() argument 303 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, name, in aa_path_perm() 448 int aa_file_perm(int op, struct aa_profile *profile, struct file *file, in aa_file_perm() argument 456 return aa_path_perm(op, profile, &file->f_path, PATH_DELEGATE_DELETED, in aa_file_perm()
|
D | policy.c | 903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, in audit_policy() argument 910 aad.op = op; in audit_policy() 925 bool aa_may_manage_policy(int op) in aa_may_manage_policy() argument 929 audit_policy(op, GFP_KERNEL, NULL, "policy_locked", -EACCES); in aa_may_manage_policy() 934 audit_policy(op, GFP_KERNEL, NULL, "not policy admin", -EACCES); in aa_may_manage_policy() 1073 int op = OP_PROF_REPL; in aa_replace_profiles() local 1164 op = (!ent->old && !ent->rename) ? OP_PROF_LOAD : OP_PROF_REPL; in aa_replace_profiles() 1166 audit_policy(op, GFP_ATOMIC, ent->new->base.name, NULL, error); in aa_replace_profiles() 1218 error = audit_policy(op, GFP_KERNEL, name, info, error); in aa_replace_profiles()
|
D | procattr.c | 90 static char *split_token_from_name(int op, char *args, u64 * token) in split_token_from_name() argument 96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args); in split_token_from_name()
|
D | audit.c | 120 if (sa->aad->op) { in audit_pre() 122 audit_log_string(ab, op_table[sa->aad->op]); in audit_pre()
|
D | domain.c | 755 int op, error = 0; in aa_change_profile() local 763 op = OP_CHANGE_ONEXEC; in aa_change_profile() 766 op = OP_CHANGE_PROFILE; in aa_change_profile() 846 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, in aa_change_profile()
|
D | ipc.c | 47 aad.op = OP_PTRACE; in aa_audit_ptrace()
|
D | capability.c | 74 sa.aad->op = OP_CAPABLE; in audit_caps()
|
D | resource.c | 58 aad.op = OP_SETRLIMIT, in audit_resource()
|
/security/selinux/include/ |
D | audit.h | 32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 54 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule,
|
/security/integrity/ |
D | integrity_audit.c | 32 const unsigned char *fname, const char *op, in integrity_audit_msg() argument 49 audit_log_string(ab, op); in integrity_audit_msg()
|
D | integrity.h | 163 const unsigned char *fname, const char *op, 168 const char *op, const char *cause, in integrity_audit_msg() argument
|
/security/apparmor/include/ |
D | file.h | 148 gfp_t gfp, int op, u32 request, const char *name, 174 int aa_path_perm(int op, struct aa_profile *profile, struct path *path, 180 int aa_file_perm(int op, struct aa_profile *profile, struct file *file,
|
D | audit.h | 107 int op; member
|
/security/smack/ |
D | smack_lsm.c | 552 char *op; in smack_sb_kern_mount() local 562 for (op = data; op != NULL; op = commap) { in smack_sb_kern_mount() 563 commap = strchr(op, ','); in smack_sb_kern_mount() 567 if (strncmp(op, SMK_FSHAT, strlen(SMK_FSHAT)) == 0) { in smack_sb_kern_mount() 568 op += strlen(SMK_FSHAT); in smack_sb_kern_mount() 569 skp = smk_import_entry(op, 0); in smack_sb_kern_mount() 574 } else if (strncmp(op, SMK_FSFLOOR, strlen(SMK_FSFLOOR)) == 0) { in smack_sb_kern_mount() 575 op += strlen(SMK_FSFLOOR); in smack_sb_kern_mount() 576 skp = smk_import_entry(op, 0); in smack_sb_kern_mount() 581 } else if (strncmp(op, SMK_FSDEFAULT, in smack_sb_kern_mount() [all …]
|
/security/selinux/ss/ |
D | constraint.h | 48 u32 op; /* operator */ member
|
D | services.c | 318 switch (e->op) { in constraint_expr_eval() 362 switch (e->op) { in constraint_expr_eval() 388 switch (e->op) { in constraint_expr_eval() 424 switch (e->op) { in constraint_expr_eval() 3026 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3048 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init() 3147 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, in selinux_audit_rule_match() argument 3180 switch (op) { in selinux_audit_rule_match() 3191 switch (op) { in selinux_audit_rule_match() 3202 switch (op) { in selinux_audit_rule_match() [all …]
|
/security/ |
D | lsm_audit.c | 251 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data() 253 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data() 260 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); in dump_common_audit_data()
|
/security/keys/ |
D | request_key.c | 95 const char *op, in call_sbin_request_key() argument 107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); in call_sbin_request_key() 165 argv[i++] = (char *) op; in call_sbin_request_key()
|