Home
last modified time | relevance | path

Searched refs:op (Results 1 – 25 of 32) sorted by relevance

12

/security/apparmor/
Dnet.c132 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument
136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
143 static int aa_label_sk_perm(struct aa_label *label, const char *op, u32 request, in aa_label_sk_perm() argument
153 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm()
162 int aa_sk_perm(const char *op, u32 request, struct sock *sk) in aa_sk_perm() argument
172 error = aa_label_sk_perm(label, op, request, sk); in aa_sk_perm()
179 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, in aa_sock_file_perm() argument
186 return aa_label_sk_perm(label, op, request, sock->sk); in aa_sock_file_perm()
244 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request, in apparmor_secmark_check() argument
248 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
Dfile.c102 const char *op, u32 request, const char *name, in aa_audit_file() argument
107 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_TASK, op); in aa_audit_file()
166 static int path_name(const char *op, struct aa_label *label, in path_name() argument
178 aa_audit_file(profile, &nullperms, op, request, *name, in path_name()
277 int __aa_path_perm(const char *op, struct aa_profile *profile, const char *name, in __aa_path_perm() argument
288 return aa_audit_file(profile, perms, op, request, name, NULL, NULL, in __aa_path_perm()
293 static int profile_path_perm(const char *op, struct aa_profile *profile, in profile_path_perm() argument
304 error = path_name(op, &profile->label, path, in profile_path_perm()
309 return __aa_path_perm(op, profile, name, request, cond, flags, in profile_path_perm()
324 int aa_path_perm(const char *op, struct aa_label *label, in aa_path_perm() argument
[all …]
Daudit.c64 if (aad(sa)->op) { in audit_pre()
66 audit_log_string(ab, aad(sa)->op); in audit_pre()
178 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
184 if (op != Audit_equal && op != Audit_not_equal) in aa_audit_rule_init()
224 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument
240 switch (op) { in aa_audit_rule_match()
Dpolicy.c617 static int audit_policy(struct aa_label *label, const char *op, in audit_policy() argument
621 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, op); in audit_policy()
682 const char *op; in aa_may_manage_policy() local
685 op = OP_PROF_RM; in aa_may_manage_policy()
687 op = OP_PROF_REPL; in aa_may_manage_policy()
689 op = OP_PROF_LOAD; in aa_may_manage_policy()
693 return audit_policy(label, op, NULL, NULL, "policy_locked", in aa_may_manage_policy()
697 return audit_policy(label, op, NULL, NULL, "not policy admin", in aa_may_manage_policy()
863 const char *op; in aa_replace_profiles() local
867 op = mask & AA_MAY_REPLACE_POLICY ? OP_PROF_REPL : OP_PROF_LOAD; in aa_replace_profiles()
[all …]
Dlsm.c193 static int common_perm(const char *op, const struct path *path, u32 mask, in common_perm() argument
201 error = aa_path_perm(op, label, path, 0, mask, cond); in common_perm()
215 static int common_perm_cond(const char *op, const struct path *path, u32 mask) in common_perm_cond() argument
224 return common_perm(op, path, mask, &cond); in common_perm_cond()
237 static int common_perm_dir_dentry(const char *op, const struct path *dir, in common_perm_dir_dentry() argument
243 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry()
255 static int common_perm_rm(const char *op, const struct path *dir, in common_perm_rm() argument
267 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm()
280 static int common_perm_create(const char *op, const struct path *dir, in common_perm_create() argument
288 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create()
[all …]
Dprocattr.c78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument
84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name()
Ddomain.c1278 static int change_profile_perms_wrapper(const char *op, const char *name, in change_profile_perms_wrapper() argument
1290 error = aa_audit_file(profile, perms, op, request, name, in change_profile_perms_wrapper()
1321 char *op; in aa_change_profile() local
1344 op = OP_STACK_ONEXEC; in aa_change_profile()
1346 op = OP_CHANGE_ONEXEC; in aa_change_profile()
1350 op = OP_STACK; in aa_change_profile()
1352 op = OP_CHANGE_PROFILE; in aa_change_profile()
1397 change_profile_perms_wrapper(op, auditname, in aa_change_profile()
1468 aa_audit_file(profile, &perms, op, request, auditname, in aa_change_profile()
/security/keys/
Dkeyctl_pkey.c115 int op, in keyctl_pkey_params_get_2() argument
136 switch (op) { in keyctl_pkey_params_get_2()
206 long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
216 ret = keyctl_pkey_params_get_2(_params, _info, op, &params); in keyctl_pkey_e_d_s()
224 switch (op) { in keyctl_pkey_e_d_s()
226 params.op = kernel_pkey_encrypt; in keyctl_pkey_e_d_s()
229 params.op = kernel_pkey_decrypt; in keyctl_pkey_e_d_s()
232 params.op = kernel_pkey_sign; in keyctl_pkey_e_d_s()
312 params.op = kernel_pkey_verify; in keyctl_pkey_verify()
Drequest_key_auth.c162 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument
182 strlcpy(rka->op, op, sizeof(rka->op)); in request_key_auth_new()
Dinternal.h194 const char *op,
322 static inline long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
Dbig_key.c100 static int big_key_crypt(enum big_key_op op, struct big_key_buf *buf, size_t datalen, u8 *key) in big_key_crypt() argument
126 if (op == BIG_KEY_ENC) in big_key_crypt()
/security/apparmor/include/
Dnet.h94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family,
104 int aa_sk_perm(const char *op, u32 request, struct sock *sk);
106 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request,
109 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request,
Daudit.h110 const char *op; member
160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
Dfile.h160 const char *op, u32 request, const char *name,
189 int __aa_path_perm(const char *op, struct aa_profile *profile,
192 int aa_path_perm(const char *op, struct aa_label *label,
199 int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
/security/integrity/ima/
Dima_api.c95 static const char op[] = "add_template_measure"; in ima_store_template() local
114 template_name, op, in ima_store_template()
121 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
134 const char *op, const char *cause) in ima_add_violation() argument
159 op, cause, result, 0); in ima_add_violation()
299 static const char op[] = "add_template_measure"; in ima_store_measurement() local
324 op, audit_cause, result, 0); in ima_store_measurement()
Dima_init.c44 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local
87 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
Dima.h135 const char *op, struct inode *inode,
146 const char *op, const char *cause);
367 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument
373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
Dima_queue.c165 const char *op, struct inode *inode, in ima_add_template_entry() argument
204 op, audit_cause, result, audit_info); in ima_add_template_entry()
Dima_appraise.c320 static const char op[] = "appraise_data"; in ima_appraise_measurement() local
396 op, cause, rc, 0); in ima_appraise_measurement()
413 op, cause, rc, 0); in ima_appraise_measurement()
/security/selinux/include/
Daudit.h26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
/security/integrity/
Dintegrity_audit.c29 const unsigned char *fname, const char *op, in integrity_audit_msg() argument
45 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_msg()
Dintegrity.h232 const unsigned char *fname, const char *op,
244 const char *op, const char *cause, in integrity_audit_msg() argument
/security/selinux/ss/
Dconstraint.h49 u32 op; /* operator */ member
Dservices.c309 switch (e->op) { in constraint_expr_eval()
353 switch (e->op) { in constraint_expr_eval()
379 switch (e->op) { in constraint_expr_eval()
415 switch (e->op) { in constraint_expr_eval()
3331 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3355 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init()
3455 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3488 switch (op) { in selinux_audit_rule_match()
3499 switch (op) { in selinux_audit_rule_match()
3510 switch (op) { in selinux_audit_rule_match()
[all …]
/security/
Dlsm_audit.c261 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data()
263 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data()
270 audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); in dump_common_audit_data()

12