/security/apparmor/ |
D | Makefile | 67 $(call cmd,make-caps) 70 $(call cmd,make-rlim)
|
D | lsm.c | 449 static int apparmor_file_lock(struct file *file, unsigned int cmd) in apparmor_file_lock() argument 453 if (cmd == F_WRLCK) in apparmor_file_lock()
|
/security/tomoyo/ |
D | tomoyo.c | 305 static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, in tomoyo_file_fcntl() argument 308 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) in tomoyo_file_fcntl() 340 static int tomoyo_file_ioctl(struct file *file, unsigned int cmd, in tomoyo_file_ioctl() argument 343 return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd); in tomoyo_file_ioctl()
|
/security/ |
D | security.c | 751 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_ioctl() argument 753 return call_int_hook(file_ioctl, 0, file, cmd, arg); in security_file_ioctl() 811 int security_file_lock(struct file *file, unsigned int cmd) in security_file_lock() argument 813 return call_int_hook(file_lock, 0, file, cmd); in security_file_lock() 816 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_fcntl() argument 818 return call_int_hook(file_fcntl, 0, file, cmd, arg); in security_file_fcntl() 1055 int security_msg_queue_msgctl(struct msg_queue *msq, int cmd) in security_msg_queue_msgctl() argument 1057 return call_int_hook(msg_queue_msgctl, 0, msq, cmd); in security_msg_queue_msgctl() 1087 int security_shm_shmctl(struct shmid_kernel *shp, int cmd) in security_shm_shmctl() argument 1089 return call_int_hook(shm_shmctl, 0, shp, cmd); in security_shm_shmctl() [all …]
|
D | lsm_audit.c | 260 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); in dump_common_audit_data()
|
/security/smack/ |
D | smack_lsm.c | 1605 static int smack_file_ioctl(struct file *file, unsigned int cmd, in smack_file_ioctl() argument 1615 if (_IOC_DIR(cmd) & _IOC_WRITE) { in smack_file_ioctl() 1620 if (rc == 0 && (_IOC_DIR(cmd) & _IOC_READ)) { in smack_file_ioctl() 1635 static int smack_file_lock(struct file *file, unsigned int cmd) in smack_file_lock() argument 1660 static int smack_file_fcntl(struct file *file, unsigned int cmd, in smack_file_fcntl() argument 1667 switch (cmd) { in smack_file_fcntl() 2967 static int smack_shm_shmctl(struct shmid_kernel *shp, int cmd) in smack_shm_shmctl() argument 2971 switch (cmd) { in smack_shm_shmctl() 3094 static int smack_sem_semctl(struct sem_array *sma, int cmd) in smack_sem_semctl() argument 3098 switch (cmd) { in smack_sem_semctl() [all …]
|
/security/keys/ |
D | trusted.c | 357 static int trusted_tpm_send(const u32 chip_num, unsigned char *cmd, in trusted_tpm_send() argument 362 dump_tpm_buf(cmd); in trusted_tpm_send() 363 rc = tpm_send(chip_num, cmd, buflen); in trusted_tpm_send() 364 dump_tpm_buf(cmd); in trusted_tpm_send()
|
/security/selinux/ |
D | hooks.c | 3247 u32 requested, u16 cmd) in ioctl_has_perm() argument 3256 u8 driver = cmd >> 8; in ioctl_has_perm() 3257 u8 xperm = cmd & 0xff; in ioctl_has_perm() 3261 ad.u.op->cmd = cmd; in ioctl_has_perm() 3282 static int selinux_file_ioctl(struct file *file, unsigned int cmd, in selinux_file_ioctl() argument 3288 switch (cmd) { in selinux_file_ioctl() 3324 error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); in selinux_file_ioctl() 3426 static int selinux_file_lock(struct file *file, unsigned int cmd) in selinux_file_lock() argument 3433 static int selinux_file_fcntl(struct file *file, unsigned int cmd, in selinux_file_fcntl() argument 3439 switch (cmd) { in selinux_file_fcntl() [all …]
|