Home
last modified time | relevance | path

Searched refs:request (Results 1 – 14 of 14) sorted by relevance

/security/apparmor/
Dfile.c63 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
65 audit_file_mask(ab, aad(sa)->request); in file_audit_cb()
71 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
104 const char *op, u32 request, const char *name, in aa_audit_file() argument
112 aad(&sa)->request = request; in aa_audit_file()
128 aad(&sa)->request &= mask; in aa_audit_file()
130 if (likely(!aad(&sa)->request)) in aa_audit_file()
135 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file()
136 AA_BUG(!aad(&sa)->request); in aa_audit_file()
138 if (aad(&sa)->request & perms->kill) in aa_audit_file()
[all …]
Dipc.c53 if (aad(sa)->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
55 audit_ptrace_mask(ab, aad(sa)->request); in audit_ptrace_cb()
70 struct aa_label *peer, u32 request, in profile_ptrace_perm() argument
76 aa_profile_match_label(profile, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm()
79 return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb); in profile_ptrace_perm()
83 struct aa_label *tracer, u32 request, in profile_tracee_perm() argument
90 return profile_ptrace_perm(tracee, tracer, request, sa); in profile_tracee_perm()
94 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument
101 return profile_ptrace_perm(tracer, tracee, request, sa); in profile_tracer_perm()
109 aad(sa)->request = 0; in profile_tracer_perm()
[all …]
Dlib.c260 if (aad(sa)->request) { in aa_audit_perms_cb()
262 aa_audit_perm_mask(ab, aad(sa)->request, aa_file_perm_chrs, in aa_audit_perms_cb()
379 int type, u32 request, struct aa_perms *perms) in aa_profile_match_label() argument
387 aa_label_match(profile, label, state, false, request, perms); in aa_profile_match_label()
393 u32 request, int type, u32 *deny, in aa_profile_label_perm() argument
400 aad(sa)->request = request; in aa_profile_label_perm()
402 aa_profile_match_label(profile, &target->label, type, request, &perms); in aa_profile_label_perm()
404 *deny |= request & perms.deny; in aa_profile_label_perm()
405 return aa_check_perms(profile, &perms, request, sa, aa_audit_perms_cb); in aa_profile_label_perm()
427 u32 request, struct common_audit_data *sa, in aa_check_perms() argument
[all …]
Ddomain.c137 unsigned int state, bool subns, u32 request, in label_compound_match() argument
169 if ((perms->allow & request) != request) in label_compound_match()
197 unsigned int start, bool subns, u32 request, in label_components_match() argument
234 if ((perms->allow & request) != request) in label_components_match()
257 bool stack, unsigned int state, bool subns, u32 request, in label_match() argument
264 request, perms); in label_match()
270 request, perms); in label_match()
291 u32 request, unsigned int start, in change_profile_perms() argument
301 return label_match(profile, target, stack, start, true, request, perms); in change_profile_perms()
1109 u32 request, struct aa_perms *perms) in change_profile_perms_wrapper() argument
[all …]
Dmount.c136 unsigned long flags, const void *data, u32 request, in audit_mount() argument
149 request &= mask; in audit_mount()
151 if (likely(!request)) in audit_mount()
156 request = request & ~perms->allow; in audit_mount()
158 if (request & perms->kill) in audit_mount()
162 if ((request & perms->quiet) && in audit_mount()
165 request &= ~perms->quiet; in audit_mount()
167 if (!request) in audit_mount()
Dlabel.c1280 unsigned int state, bool subns, u32 request, in label_compound_match() argument
1311 if ((perms->allow & request) != request) in label_compound_match()
1338 bool subns, u32 request, in label_components_match() argument
1374 if ((perms->allow & request) != request) in label_components_match()
1396 unsigned int state, bool subns, u32 request, in aa_label_match() argument
1399 int error = label_compound_match(profile, label, state, subns, request, in aa_label_match()
1405 return label_components_match(profile, label, state, subns, request, in aa_label_match()
/security/smack/
Dsmack_access.c121 int request, struct smk_audit_info *a) in smk_access() argument
158 if ((request & MAY_ANYREAD) == request || in smk_access()
159 (request & MAY_LOCK) == request) { in smk_access()
177 if (may <= 0 || (request & may) != request) { in smk_access()
205 request, rc, a); in smk_access()
327 if (sad->request[0] == '\0') in smack_log_callback()
330 audit_log_format(ab, " requested=%s", sad->request); in smack_log_callback()
344 void smack_log(char *subject_label, char *object_label, int request, in smack_log() argument
367 smack_str_from_perm(request_buffer, request); in smack_log()
385 sad->request = request_buffer; in smack_log()
[all …]
Dsmack.h293 char *request; member
418 int request,
Dsmack_lsm.c4359 int request = 0; in smack_key_permission() local
4388 request |= MAY_READ; in smack_key_permission()
4390 request |= MAY_WRITE; in smack_key_permission()
4391 rc = smk_access(tkp, keyp->security, request, &ad); in smack_key_permission()
4392 rc = smk_bu_note("key access", tkp, keyp->security, request, rc); in smack_key_permission()
/security/apparmor/include/
Dfile.h161 const char *op, u32 request, const char *name,
191 const char *name, u32 request, struct path_cond *cond,
194 const struct path *path, int flags, u32 request,
201 u32 request);
Dperms.h151 int type, u32 request, struct aa_perms *perms);
153 u32 request, int type, u32 *deny,
156 u32 request, struct common_audit_data *sa,
Dipc.h37 u32 request);
Daudit.h118 u32 request; member
Dlabel.h336 unsigned int state, bool subns, u32 request,