/security/integrity/ima/ |
D | ima_policy.c | 67 enum ima_hooks func; member 115 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 117 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 119 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 122 {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, 123 {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, 127 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 129 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 131 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 134 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, [all …]
|
D | ima_appraise.c | 48 int ima_must_appraise(struct inode *inode, int mask, enum ima_hooks func) in ima_must_appraise() argument 56 return ima_match_policy(inode, current_cred(), secid, func, mask, in ima_must_appraise() 83 enum ima_hooks func) in ima_get_cache_status() argument 85 switch (func) { in ima_get_cache_status() 102 enum ima_hooks func, in ima_set_cache_status() argument 105 switch (func) { in ima_set_cache_status() 127 enum ima_hooks func) in ima_cache_flags() argument 129 switch (func) { in ima_cache_flags() 209 static int xattr_verify(enum ima_hooks func, struct integrity_iint_cache *iint, in xattr_verify() argument 257 func == KEXEC_KERNEL_CHECK) in xattr_verify() [all …]
|
D | ima.h | 209 int mask, enum ima_hooks func, int *pcr, 211 int ima_must_measure(struct inode *inode, int mask, enum ima_hooks func); 233 enum ima_hooks func, int mask, int flags, int *pcr, 256 int ima_appraise_measurement(enum ima_hooks func, 261 int ima_must_appraise(struct inode *inode, int mask, enum ima_hooks func); 264 enum ima_hooks func); 271 static inline int ima_appraise_measurement(enum ima_hooks func, in ima_appraise_measurement() argument 283 enum ima_hooks func) in ima_must_appraise() argument 295 enum ima_hooks func) in ima_get_cache_status() argument 315 bool ima_hook_supports_modsig(enum ima_hooks func); [all …]
|
D | ima_main.c | 76 static int mmap_violation_check(enum ima_hooks func, struct file *file, in mmap_violation_check() argument 83 if ((func == MMAP_CHECK) && mapping_writably_mapped(file->f_mapping)) { in mmap_violation_check() 194 enum ima_hooks func) in process_measurement() argument 217 action = ima_get_action(inode, cred, secid, mask, func, &pcr, in process_measurement() 219 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK) && in process_measurement() 228 func = FILE_CHECK; in process_measurement() 297 rc = mmap_violation_check(func, file, &pathbuf, in process_measurement() 300 rc = ima_get_cache_status(iint, func); in process_measurement() 316 rc = ima_read_modsig(func, buf, size, &modsig); in process_measurement() 339 rc = ima_appraise_measurement(func, iint, file, pathname, in process_measurement() [all …]
|
D | ima_modsig.c | 43 bool ima_hook_supports_modsig(enum ima_hooks func) in ima_hook_supports_modsig() argument 45 switch (func) { in ima_hook_supports_modsig() 60 int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, in ima_read_modsig() argument 80 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig()
|
D | ima_api.c | 185 int mask, enum ima_hooks func, int *pcr, in ima_get_action() argument 192 return ima_match_policy(inode, cred, secid, func, mask, flags, pcr, in ima_get_action()
|
/security/smack/ |
D | smack.h | 451 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument 457 a->a.smack_audit_data->function = func; in smk_ad_init() 460 static inline void smk_ad_init_net(struct smk_audit_info *a, const char *func, in smk_ad_init_net() argument 463 smk_ad_init(a, func, type); in smk_ad_init_net() 496 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument
|
D | smack_lsm.c | 422 unsigned int mode, const char *func) in smk_ptrace_rule_check() argument 431 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check()
|
/security/selinux/ss/ |
D | sidtab.h | 67 int (*func)(struct context *oldc, struct context *newc, void *args); member
|
D | sidtab.c | 291 rc = convert->func(context, &dst_convert->context, in sidtab_context_to_sid() 369 rc = convert->func(&esrc->ptr_leaf->entries[i].context, in sidtab_convert_tree()
|
D | services.c | 2245 convert_params.func = convert_context; in security_load_policy()
|
/security/keys/ |
D | internal.h | 112 int (*func)(const struct key *key, void *data),
|