/security/apparmor/ |
D | Makefile | 102 $(call cmd,make-caps) 105 $(call cmd,make-rlim) 109 $(call cmd,make-af) 110 $(call cmd,make-sock)
|
D | lsm.c | 471 static int apparmor_file_lock(struct file *file, unsigned int cmd) in apparmor_file_lock() argument 475 if (cmd == F_WRLCK) in apparmor_file_lock()
|
/security/tomoyo/ |
D | tomoyo.c | 297 static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, in tomoyo_file_fcntl() argument 300 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) in tomoyo_file_fcntl() 332 static int tomoyo_file_ioctl(struct file *file, unsigned int cmd, in tomoyo_file_ioctl() argument 335 return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd); in tomoyo_file_ioctl()
|
/security/ |
D | security.c | 1408 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_ioctl() argument 1410 return call_int_hook(file_ioctl, 0, file, cmd, arg); in security_file_ioctl() 1468 int security_file_lock(struct file *file, unsigned int cmd) in security_file_lock() argument 1470 return call_int_hook(file_lock, 0, file, cmd); in security_file_lock() 1473 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) in security_file_fcntl() argument 1475 return call_int_hook(file_fcntl, 0, file, cmd, arg); in security_file_fcntl() 1785 int security_msg_queue_msgctl(struct kern_ipc_perm *msq, int cmd) in security_msg_queue_msgctl() argument 1787 return call_int_hook(msg_queue_msgctl, 0, msq, cmd); in security_msg_queue_msgctl() 1826 int security_shm_shmctl(struct kern_ipc_perm *shp, int cmd) in security_shm_shmctl() argument 1828 return call_int_hook(shm_shmctl, 0, shp, cmd); in security_shm_shmctl() [all …]
|
D | lsm_audit.c | 270 audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); in dump_common_audit_data()
|
/security/smack/ |
D | smack_lsm.c | 1554 static int smack_file_ioctl(struct file *file, unsigned int cmd, in smack_file_ioctl() argument 1567 if (_IOC_DIR(cmd) & _IOC_WRITE) { in smack_file_ioctl() 1572 if (rc == 0 && (_IOC_DIR(cmd) & _IOC_READ)) { in smack_file_ioctl() 1587 static int smack_file_lock(struct file *file, unsigned int cmd) in smack_file_lock() argument 1615 static int smack_file_fcntl(struct file *file, unsigned int cmd, in smack_file_fcntl() argument 1625 switch (cmd) { in smack_file_fcntl() 2980 static int smack_shm_shmctl(struct kern_ipc_perm *isp, int cmd) in smack_shm_shmctl() argument 2984 switch (cmd) { in smack_shm_shmctl() 3069 static int smack_sem_semctl(struct kern_ipc_perm *isp, int cmd) in smack_sem_semctl() argument 3073 switch (cmd) { in smack_sem_semctl() [all …]
|
/security/keys/ |
D | trusted.c | 364 int trusted_tpm_send(unsigned char *cmd, size_t buflen) in trusted_tpm_send() argument 371 dump_tpm_buf(cmd); in trusted_tpm_send() 372 rc = tpm_send(chip, cmd, buflen); in trusted_tpm_send() 373 dump_tpm_buf(cmd); in trusted_tpm_send()
|
/security/selinux/ |
D | hooks.c | 3557 u32 requested, u16 cmd) in ioctl_has_perm() argument 3566 u8 driver = cmd >> 8; in ioctl_has_perm() 3567 u8 xperm = cmd & 0xff; in ioctl_has_perm() 3571 ad.u.op->cmd = cmd; in ioctl_has_perm() 3595 static int selinux_file_ioctl(struct file *file, unsigned int cmd, in selinux_file_ioctl() argument 3601 switch (cmd) { in selinux_file_ioctl() 3637 error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); in selinux_file_ioctl() 3761 static int selinux_file_lock(struct file *file, unsigned int cmd) in selinux_file_lock() argument 3768 static int selinux_file_fcntl(struct file *file, unsigned int cmd, in selinux_file_fcntl() argument 3774 switch (cmd) { in selinux_file_fcntl() [all …]
|