/security/apparmor/ |
D | net.c | 132 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument 136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm() 143 static int aa_label_sk_perm(struct aa_label *label, const char *op, u32 request, in aa_label_sk_perm() argument 153 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm() 162 int aa_sk_perm(const char *op, u32 request, struct sock *sk) in aa_sk_perm() argument 172 error = aa_label_sk_perm(label, op, request, sk); in aa_sk_perm() 179 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, in aa_sock_file_perm() argument 186 return aa_label_sk_perm(label, op, request, sock->sk); in aa_sock_file_perm() 244 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request, in apparmor_secmark_check() argument 248 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
|
D | file.c | 102 const char *op, u32 request, const char *name, in aa_audit_file() argument 107 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_TASK, op); in aa_audit_file() 166 static int path_name(const char *op, struct aa_label *label, in path_name() argument 178 aa_audit_file(profile, &nullperms, op, request, *name, in path_name() 277 int __aa_path_perm(const char *op, struct aa_profile *profile, const char *name, in __aa_path_perm() argument 288 return aa_audit_file(profile, perms, op, request, name, NULL, NULL, in __aa_path_perm() 293 static int profile_path_perm(const char *op, struct aa_profile *profile, in profile_path_perm() argument 304 error = path_name(op, &profile->label, path, in profile_path_perm() 309 return __aa_path_perm(op, profile, name, request, cond, flags, in profile_path_perm() 324 int aa_path_perm(const char *op, struct aa_label *label, in aa_path_perm() argument [all …]
|
D | audit.c | 64 if (aad(sa)->op) { in audit_pre() 66 audit_log_string(ab, aad(sa)->op); in audit_pre() 178 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 184 if (op != Audit_equal && op != Audit_not_equal) in aa_audit_rule_init() 224 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 240 switch (op) { in aa_audit_rule_match()
|
D | policy.c | 617 static int audit_policy(struct aa_label *label, const char *op, in audit_policy() argument 621 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, op); in audit_policy() 682 const char *op; in aa_may_manage_policy() local 685 op = OP_PROF_RM; in aa_may_manage_policy() 687 op = OP_PROF_REPL; in aa_may_manage_policy() 689 op = OP_PROF_LOAD; in aa_may_manage_policy() 693 return audit_policy(label, op, NULL, NULL, "policy_locked", in aa_may_manage_policy() 697 return audit_policy(label, op, NULL, NULL, "not policy admin", in aa_may_manage_policy() 863 const char *op; in aa_replace_profiles() local 867 op = mask & AA_MAY_REPLACE_POLICY ? OP_PROF_REPL : OP_PROF_LOAD; in aa_replace_profiles() [all …]
|
D | lsm.c | 193 static int common_perm(const char *op, const struct path *path, u32 mask, in common_perm() argument 201 error = aa_path_perm(op, label, path, 0, mask, cond); in common_perm() 215 static int common_perm_cond(const char *op, const struct path *path, u32 mask) in common_perm_cond() argument 224 return common_perm(op, path, mask, &cond); in common_perm_cond() 237 static int common_perm_dir_dentry(const char *op, const struct path *dir, in common_perm_dir_dentry() argument 243 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry() 255 static int common_perm_rm(const char *op, const struct path *dir, in common_perm_rm() argument 267 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm() 280 static int common_perm_create(const char *op, const struct path *dir, in common_perm_create() argument 288 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create() [all …]
|
D | procattr.c | 78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name()
|
D | domain.c | 1278 static int change_profile_perms_wrapper(const char *op, const char *name, in change_profile_perms_wrapper() argument 1290 error = aa_audit_file(profile, perms, op, request, name, in change_profile_perms_wrapper() 1321 char *op; in aa_change_profile() local 1344 op = OP_STACK_ONEXEC; in aa_change_profile() 1346 op = OP_CHANGE_ONEXEC; in aa_change_profile() 1350 op = OP_STACK; in aa_change_profile() 1352 op = OP_CHANGE_PROFILE; in aa_change_profile() 1397 change_profile_perms_wrapper(op, auditname, in aa_change_profile() 1468 aa_audit_file(profile, &perms, op, request, auditname, in aa_change_profile()
|
/security/keys/ |
D | keyctl_pkey.c | 115 int op, in keyctl_pkey_params_get_2() argument 136 switch (op) { in keyctl_pkey_params_get_2() 206 long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument 216 ret = keyctl_pkey_params_get_2(_params, _info, op, ¶ms); in keyctl_pkey_e_d_s() 224 switch (op) { in keyctl_pkey_e_d_s() 226 params.op = kernel_pkey_encrypt; in keyctl_pkey_e_d_s() 229 params.op = kernel_pkey_decrypt; in keyctl_pkey_e_d_s() 232 params.op = kernel_pkey_sign; in keyctl_pkey_e_d_s() 312 params.op = kernel_pkey_verify; in keyctl_pkey_verify()
|
D | request_key_auth.c | 162 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument 182 strlcpy(rka->op, op, sizeof(rka->op)); in request_key_auth_new()
|
D | internal.h | 194 const char *op, 322 static inline long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
|
D | big_key.c | 100 static int big_key_crypt(enum big_key_op op, struct big_key_buf *buf, size_t datalen, u8 *key) in big_key_crypt() argument 126 if (op == BIG_KEY_ENC) in big_key_crypt()
|
/security/apparmor/include/ |
D | net.h | 94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, 104 int aa_sk_perm(const char *op, u32 request, struct sock *sk); 106 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, 109 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request,
|
D | audit.h | 110 const char *op; member 160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \ 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule); 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|
D | file.h | 160 const char *op, u32 request, const char *name, 189 int __aa_path_perm(const char *op, struct aa_profile *profile, 192 int aa_path_perm(const char *op, struct aa_label *label, 199 int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
|
/security/integrity/ima/ |
D | ima_api.c | 95 static const char op[] = "add_template_measure"; in ima_store_template() local 114 template_name, op, in ima_store_template() 121 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template() 134 const char *op, const char *cause) in ima_add_violation() argument 159 op, cause, result, 0); in ima_add_violation() 299 static const char op[] = "add_template_measure"; in ima_store_measurement() local 324 op, audit_cause, result, 0); in ima_store_measurement()
|
D | ima_init.c | 44 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local 87 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
|
D | ima.h | 135 const char *op, struct inode *inode, 146 const char *op, const char *cause); 367 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument 373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
D | ima_queue.c | 165 const char *op, struct inode *inode, in ima_add_template_entry() argument 204 op, audit_cause, result, audit_info); in ima_add_template_entry()
|
D | ima_appraise.c | 320 static const char op[] = "appraise_data"; in ima_appraise_measurement() local 396 op, cause, rc, 0); in ima_appraise_measurement() 413 op, cause, rc, 0); in ima_appraise_measurement()
|
/security/selinux/include/ |
D | audit.h | 26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/integrity/ |
D | integrity_audit.c | 29 const unsigned char *fname, const char *op, in integrity_audit_msg() argument 45 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_msg()
|
D | integrity.h | 232 const unsigned char *fname, const char *op, 244 const char *op, const char *cause, in integrity_audit_msg() argument
|
/security/selinux/ss/ |
D | constraint.h | 49 u32 op; /* operator */ member
|
D | services.c | 309 switch (e->op) { in constraint_expr_eval() 353 switch (e->op) { in constraint_expr_eval() 379 switch (e->op) { in constraint_expr_eval() 415 switch (e->op) { in constraint_expr_eval() 3331 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3355 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init() 3455 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3488 switch (op) { in selinux_audit_rule_match() 3499 switch (op) { in selinux_audit_rule_match() 3510 switch (op) { in selinux_audit_rule_match() [all …]
|
/security/ |
D | lsm_audit.c | 261 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data() 263 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data() 270 audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); in dump_common_audit_data()
|