/security/apparmor/ |
D | Makefile | 62 $(call cmd,make-caps) 65 $(call cmd,make-rlim)
|
D | lsm.c | 459 static int apparmor_file_lock(struct file *file, unsigned int cmd) in apparmor_file_lock() argument 463 if (cmd == F_WRLCK) in apparmor_file_lock()
|
/security/tomoyo/ |
D | tomoyo.c | 312 static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, in tomoyo_file_fcntl() argument 315 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) in tomoyo_file_fcntl() 347 static int tomoyo_file_ioctl(struct file *file, unsigned int cmd, in tomoyo_file_ioctl() argument 350 return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd); in tomoyo_file_ioctl()
|
/security/ |
D | security.c | 675 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_ioctl() argument 677 return security_ops->file_ioctl(file, cmd, arg); in security_file_ioctl() 698 int security_file_lock(struct file *file, unsigned int cmd) in security_file_lock() argument 700 return security_ops->file_lock(file, cmd); in security_file_lock() 703 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_fcntl() argument 705 return security_ops->file_fcntl(file, cmd, arg); in security_file_fcntl() 900 int security_msg_queue_msgctl(struct msg_queue *msq, int cmd) in security_msg_queue_msgctl() argument 902 return security_ops->msg_queue_msgctl(msq, cmd); in security_msg_queue_msgctl() 932 int security_shm_shmctl(struct shmid_kernel *shp, int cmd) in security_shm_shmctl() argument 934 return security_ops->shm_shmctl(shp, cmd); in security_shm_shmctl() [all …]
|
D | capability.c | 344 static int cap_file_lock(struct file *file, unsigned int cmd) in cap_file_lock() argument 349 static int cap_file_fcntl(struct file *file, unsigned int cmd, in cap_file_fcntl() argument 507 static int cap_msg_queue_msgctl(struct msg_queue *msq, int cmd) in cap_msg_queue_msgctl() argument 538 static int cap_shm_shmctl(struct shmid_kernel *shp, int cmd) in cap_shm_shmctl() argument 563 static int cap_sem_semctl(struct sem_array *sma, int cmd) in cap_sem_semctl() argument
|
D | lsm_audit.c | 257 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); in dump_common_audit_data()
|
/security/smack/ |
D | smack_lsm.c | 1093 static int smack_file_ioctl(struct file *file, unsigned int cmd, in smack_file_ioctl() argument 1102 if (_IOC_DIR(cmd) & _IOC_WRITE) in smack_file_ioctl() 1105 if (rc == 0 && (_IOC_DIR(cmd) & _IOC_READ)) in smack_file_ioctl() 1118 static int smack_file_lock(struct file *file, unsigned int cmd) in smack_file_lock() argument 1139 static int smack_file_fcntl(struct file *file, unsigned int cmd, in smack_file_fcntl() argument 1146 switch (cmd) { in smack_file_fcntl() 2195 static int smack_shm_shmctl(struct shmid_kernel *shp, int cmd) in smack_shm_shmctl() argument 2199 switch (cmd) { in smack_shm_shmctl() 2318 static int smack_sem_semctl(struct sem_array *sma, int cmd) in smack_sem_semctl() argument 2322 switch (cmd) { in smack_sem_semctl() [all …]
|
/security/selinux/ |
D | hooks.c | 3100 u32 requested, u16 cmd) in ioctl_has_perm() argument 3110 u8 driver = cmd >> 8; in ioctl_has_perm() 3111 u8 xperm = cmd & 0xff; in ioctl_has_perm() 3115 ad.u.op->cmd = cmd; in ioctl_has_perm() 3137 static int selinux_file_ioctl(struct file *file, unsigned int cmd, in selinux_file_ioctl() argument 3143 switch (cmd) { in selinux_file_ioctl() 3179 error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); in selinux_file_ioctl() 3289 static int selinux_file_lock(struct file *file, unsigned int cmd) in selinux_file_lock() argument 3296 static int selinux_file_fcntl(struct file *file, unsigned int cmd, in selinux_file_fcntl() argument 3302 switch (cmd) { in selinux_file_fcntl() [all …]
|
/security/keys/ |
D | trusted.c | 357 static int trusted_tpm_send(const u32 chip_num, unsigned char *cmd, in trusted_tpm_send() argument 362 dump_tpm_buf(cmd); in trusted_tpm_send() 363 rc = tpm_send(chip_num, cmd, buflen); in trusted_tpm_send() 364 dump_tpm_buf(cmd); in trusted_tpm_send()
|