/security/integrity/ima/ |
D | ima_policy.c | 76 enum ima_hooks func; member 135 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 137 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 139 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 142 {.action = MEASURE, .func = MODULE_CHECK, .flags = IMA_FUNC}, 143 {.action = MEASURE, .func = FIRMWARE_CHECK, .flags = IMA_FUNC}, 147 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 149 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 151 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 154 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, [all …]
|
D | ima.h | 220 static inline const char *func_measure_str(enum ima_hooks func) in func_measure_str() argument 222 if (func >= MAX_CHECK) in func_measure_str() 225 return ima_hooks_measure_str[func]; in func_measure_str() 259 enum ima_hooks func, int *pcr, 262 int ima_must_measure(struct inode *inode, int mask, enum ima_hooks func); 273 const char *eventname, enum ima_hooks func, 289 const struct cred *cred, u32 secid, enum ima_hooks func, 316 int ima_appraise_measurement(enum ima_hooks func, 322 int mask, enum ima_hooks func); 325 enum ima_hooks func); [all …]
|
D | ima_main.c | 86 static int mmap_violation_check(enum ima_hooks func, struct file *file, in mmap_violation_check() argument 93 if ((func == MMAP_CHECK) && mapping_writably_mapped(file->f_mapping)) { in mmap_violation_check() 204 enum ima_hooks func) in process_measurement() argument 229 mask, func, &pcr, &template_desc, NULL, in process_measurement() 231 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK) && in process_measurement() 240 func = FILE_CHECK; in process_measurement() 322 rc = mmap_violation_check(func, file, &pathbuf, in process_measurement() 325 rc = ima_get_cache_status(iint, func); in process_measurement() 341 rc = ima_read_modsig(func, buf, size, &modsig); in process_measurement() 366 rc = ima_appraise_measurement(func, iint, file, in process_measurement() [all …]
|
D | ima_appraise.c | 72 int mask, enum ima_hooks func) in ima_must_appraise() argument 81 func, mask, IMA_APPRAISE | IMA_HASH, NULL, in ima_must_appraise() 108 enum ima_hooks func) in ima_get_cache_status() argument 110 switch (func) { in ima_get_cache_status() 127 enum ima_hooks func, in ima_set_cache_status() argument 130 switch (func) { in ima_set_cache_status() 152 enum ima_hooks func) in ima_cache_flags() argument 154 switch (func) { in ima_cache_flags() 235 static int xattr_verify(enum ima_hooks func, struct integrity_iint_cache *iint, in xattr_verify() argument 287 func == KEXEC_KERNEL_CHECK) in xattr_verify() [all …]
|
D | ima_modsig.c | 40 int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, in ima_read_modsig() argument 60 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig()
|
D | ima_api.c | 190 enum ima_hooks func, int *pcr, in ima_get_action() argument 198 return ima_match_policy(mnt_userns, inode, cred, secid, func, mask, in ima_get_action()
|
/security/smack/ |
D | smack.h | 459 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument 465 a->a.smack_audit_data->function = func; in smk_ad_init() 468 static inline void smk_ad_init_net(struct smk_audit_info *a, const char *func, in smk_ad_init_net() argument 471 smk_ad_init(a, func, type); in smk_ad_init_net() 504 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument
|
D | smack_lsm.c | 417 unsigned int mode, const char *func) in smk_ptrace_rule_check() argument 426 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check()
|
/security/keys/trusted-keys/ |
D | trusted_tee.c | 90 inv_arg.func = TA_CMD_SEAL; in trusted_tee_seal() 151 inv_arg.func = TA_CMD_UNSEAL; in trusted_tee_unseal() 202 inv_arg.func = TA_CMD_GET_RANDOM; in trusted_tee_get_random()
|
/security/selinux/ss/ |
D | sidtab.h | 68 int (*func)(struct context *oldc, struct context *newc, void *args, gfp_t gfp_flags); member
|
D | sidtab.c | 327 rc = convert->func(context, &dst_convert->context, in sidtab_context_to_sid() 405 rc = convert->func(&esrc->ptr_leaf->entries[i].context, in sidtab_convert_tree()
|
D | services.c | 2355 convert_data->sidtab_params.func = convert_context; in security_load_policy()
|
/security/keys/ |
D | internal.h | 116 int (*func)(const struct key *key, void *data),
|