/security/apparmor/ |
D | file.c | 63 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 65 audit_file_mask(ab, aad(sa)->request); in file_audit_cb() 71 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 104 const char *op, u32 request, const char *name, in aa_audit_file() argument 112 aad(&sa)->request = request; in aa_audit_file() 128 aad(&sa)->request &= mask; in aa_audit_file() 130 if (likely(!aad(&sa)->request)) in aa_audit_file() 135 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 136 AA_BUG(!aad(&sa)->request); in aa_audit_file() 138 if (aad(&sa)->request & perms->kill) in aa_audit_file() [all …]
|
D | ipc.c | 53 if (aad(sa)->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 55 audit_ptrace_mask(ab, aad(sa)->request); in audit_ptrace_cb() 70 struct aa_label *peer, u32 request, in profile_ptrace_perm() argument 76 aa_profile_match_label(profile, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 79 return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb); in profile_ptrace_perm() 83 struct aa_label *tracer, u32 request, in profile_tracee_perm() argument 90 return profile_ptrace_perm(tracee, tracer, request, sa); in profile_tracee_perm() 94 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument 101 return profile_ptrace_perm(tracer, tracee, request, sa); in profile_tracer_perm() 109 aad(sa)->request = 0; in profile_tracer_perm() [all …]
|
D | lib.c | 260 if (aad(sa)->request) { in aa_audit_perms_cb() 262 aa_audit_perm_mask(ab, aad(sa)->request, aa_file_perm_chrs, in aa_audit_perms_cb() 379 int type, u32 request, struct aa_perms *perms) in aa_profile_match_label() argument 387 aa_label_match(profile, label, state, false, request, perms); in aa_profile_match_label() 393 u32 request, int type, u32 *deny, in aa_profile_label_perm() argument 400 aad(sa)->request = request; in aa_profile_label_perm() 402 aa_profile_match_label(profile, &target->label, type, request, &perms); in aa_profile_label_perm() 404 *deny |= request & perms.deny; in aa_profile_label_perm() 405 return aa_check_perms(profile, &perms, request, sa, aa_audit_perms_cb); in aa_profile_label_perm() 427 u32 request, struct common_audit_data *sa, in aa_check_perms() argument [all …]
|
D | domain.c | 137 unsigned int state, bool subns, u32 request, in label_compound_match() argument 169 if ((perms->allow & request) != request) in label_compound_match() 197 unsigned int start, bool subns, u32 request, in label_components_match() argument 234 if ((perms->allow & request) != request) in label_components_match() 257 bool stack, unsigned int state, bool subns, u32 request, in label_match() argument 264 request, perms); in label_match() 270 request, perms); in label_match() 291 u32 request, unsigned int start, in change_profile_perms() argument 301 return label_match(profile, target, stack, start, true, request, perms); in change_profile_perms() 1109 u32 request, struct aa_perms *perms) in change_profile_perms_wrapper() argument [all …]
|
D | mount.c | 136 unsigned long flags, const void *data, u32 request, in audit_mount() argument 149 request &= mask; in audit_mount() 151 if (likely(!request)) in audit_mount() 156 request = request & ~perms->allow; in audit_mount() 158 if (request & perms->kill) in audit_mount() 162 if ((request & perms->quiet) && in audit_mount() 165 request &= ~perms->quiet; in audit_mount() 167 if (!request) in audit_mount()
|
D | label.c | 1280 unsigned int state, bool subns, u32 request, in label_compound_match() argument 1311 if ((perms->allow & request) != request) in label_compound_match() 1338 bool subns, u32 request, in label_components_match() argument 1374 if ((perms->allow & request) != request) in label_components_match() 1396 unsigned int state, bool subns, u32 request, in aa_label_match() argument 1399 int error = label_compound_match(profile, label, state, subns, request, in aa_label_match() 1405 return label_components_match(profile, label, state, subns, request, in aa_label_match()
|
/security/smack/ |
D | smack_access.c | 121 int request, struct smk_audit_info *a) in smk_access() argument 158 if ((request & MAY_ANYREAD) == request || in smk_access() 159 (request & MAY_LOCK) == request) { in smk_access() 177 if (may <= 0 || (request & may) != request) { in smk_access() 205 request, rc, a); in smk_access() 327 if (sad->request[0] == '\0') in smack_log_callback() 330 audit_log_format(ab, " requested=%s", sad->request); in smack_log_callback() 344 void smack_log(char *subject_label, char *object_label, int request, in smack_log() argument 367 smack_str_from_perm(request_buffer, request); in smack_log() 385 sad->request = request_buffer; in smack_log() [all …]
|
D | smack.h | 293 char *request; member 418 int request,
|
D | smack_lsm.c | 4359 int request = 0; in smack_key_permission() local 4388 request |= MAY_READ; in smack_key_permission() 4390 request |= MAY_WRITE; in smack_key_permission() 4391 rc = smk_access(tkp, keyp->security, request, &ad); in smack_key_permission() 4392 rc = smk_bu_note("key access", tkp, keyp->security, request, rc); in smack_key_permission()
|
/security/apparmor/include/ |
D | file.h | 161 const char *op, u32 request, const char *name, 191 const char *name, u32 request, struct path_cond *cond, 194 const struct path *path, int flags, u32 request, 201 u32 request);
|
D | perms.h | 151 int type, u32 request, struct aa_perms *perms); 153 u32 request, int type, u32 *deny, 156 u32 request, struct common_audit_data *sa,
|
D | ipc.h | 37 u32 request);
|
D | audit.h | 118 u32 request; member
|
D | label.h | 336 unsigned int state, bool subns, u32 request,
|