Home
last modified time | relevance | path

Searched refs:op (Results 1 – 25 of 31) sorted by relevance

12

/security/apparmor/
Dnet.c134 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument
138 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
145 static int aa_label_sk_perm(struct aa_label *label, const char *op, u32 request, in aa_label_sk_perm() argument
155 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm()
164 int aa_sk_perm(const char *op, u32 request, struct sock *sk) in aa_sk_perm() argument
174 error = aa_label_sk_perm(label, op, request, sk); in aa_sk_perm()
181 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, in aa_sock_file_perm() argument
188 return aa_label_sk_perm(label, op, request, sock->sk); in aa_sock_file_perm()
246 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request, in apparmor_secmark_check() argument
250 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
Dfile.c93 const char *op, u32 request, const char *name, in aa_audit_file() argument
98 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_TASK, op); in aa_audit_file()
157 static int path_name(const char *op, struct aa_label *label, in path_name() argument
169 aa_audit_file(profile, &nullperms, op, request, *name, in path_name()
268 int __aa_path_perm(const char *op, struct aa_profile *profile, const char *name, in __aa_path_perm() argument
279 return aa_audit_file(profile, perms, op, request, name, NULL, NULL, in __aa_path_perm()
284 static int profile_path_perm(const char *op, struct aa_profile *profile, in profile_path_perm() argument
295 error = path_name(op, &profile->label, path, in profile_path_perm()
300 return __aa_path_perm(op, profile, name, request, cond, flags, in profile_path_perm()
315 int aa_path_perm(const char *op, struct aa_label *label, in aa_path_perm() argument
[all …]
Daudit.c64 if (aad(sa)->op) { in audit_pre()
65 audit_log_format(ab, " operation=\"%s\"", aad(sa)->op); in audit_pre()
176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
182 if (op != Audit_equal && op != Audit_not_equal) in aa_audit_rule_init()
223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument
239 switch (op) { in aa_audit_rule_match()
Dpolicy.c618 static int audit_policy(struct aa_label *label, const char *op, in audit_policy() argument
622 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, op); in audit_policy()
683 const char *op; in aa_may_manage_policy() local
686 op = OP_PROF_RM; in aa_may_manage_policy()
688 op = OP_PROF_REPL; in aa_may_manage_policy()
690 op = OP_PROF_LOAD; in aa_may_manage_policy()
694 return audit_policy(label, op, NULL, NULL, "policy_locked", in aa_may_manage_policy()
698 return audit_policy(label, op, NULL, NULL, "not policy admin", in aa_may_manage_policy()
864 const char *op; in aa_replace_profiles() local
868 op = mask & AA_MAY_REPLACE_POLICY ? OP_PROF_REPL : OP_PROF_LOAD; in aa_replace_profiles()
[all …]
Dlsm.c203 static int common_perm(const char *op, const struct path *path, u32 mask, in common_perm() argument
211 error = aa_path_perm(op, label, path, 0, mask, cond); in common_perm()
225 static int common_perm_cond(const char *op, const struct path *path, u32 mask) in common_perm_cond() argument
236 return common_perm(op, path, mask, &cond); in common_perm_cond()
249 static int common_perm_dir_dentry(const char *op, const struct path *dir, in common_perm_dir_dentry() argument
255 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry()
267 static int common_perm_rm(const char *op, const struct path *dir, in common_perm_rm() argument
280 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm()
293 static int common_perm_create(const char *op, const struct path *dir, in common_perm_create() argument
301 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create()
[all …]
Dprocattr.c78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument
84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name()
Ddomain.c1261 static int change_profile_perms_wrapper(const char *op, const char *name, in change_profile_perms_wrapper() argument
1273 error = aa_audit_file(profile, perms, op, request, name, in change_profile_perms_wrapper()
1304 char *op; in aa_change_profile() local
1328 op = OP_STACK_ONEXEC; in aa_change_profile()
1330 op = OP_CHANGE_ONEXEC; in aa_change_profile()
1334 op = OP_STACK; in aa_change_profile()
1336 op = OP_CHANGE_PROFILE; in aa_change_profile()
1379 change_profile_perms_wrapper(op, auditname, in aa_change_profile()
1450 aa_audit_file(profile, &perms, op, request, auditname, in aa_change_profile()
/security/keys/
Dkeyctl_pkey.c115 int op, in keyctl_pkey_params_get_2() argument
136 switch (op) { in keyctl_pkey_params_get_2()
212 long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
222 ret = keyctl_pkey_params_get_2(_params, _info, op, &params); in keyctl_pkey_e_d_s()
230 switch (op) { in keyctl_pkey_e_d_s()
232 params.op = kernel_pkey_encrypt; in keyctl_pkey_e_d_s()
235 params.op = kernel_pkey_decrypt; in keyctl_pkey_e_d_s()
238 params.op = kernel_pkey_sign; in keyctl_pkey_e_d_s()
318 params.op = kernel_pkey_verify; in keyctl_pkey_verify()
Drequest_key_auth.c161 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument
181 strlcpy(rka->op, op, sizeof(rka->op)); in request_key_auth_new()
Dinternal.h216 const char *op,
347 static inline long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
Drequest_key.c130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key()
186 argv[i++] = (char *)rka->op; in call_sbin_request_key()
/security/integrity/
Dintegrity_audit.c29 const unsigned char *fname, const char *op, in integrity_audit_msg() argument
32 integrity_audit_message(audit_msgno, inode, fname, op, cause, in integrity_audit_msg()
37 const unsigned char *fname, const char *op, in integrity_audit_message() argument
56 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_message()
Dintegrity.h241 const unsigned char *fname, const char *op,
245 const unsigned char *fname, const char *op,
258 const char *op, const char *cause, in integrity_audit_msg() argument
266 const char *op, const char *cause, in integrity_audit_message() argument
/security/apparmor/include/
Dnet.h94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family,
104 int aa_sk_perm(const char *op, u32 request, struct sock *sk);
106 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request,
109 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request,
Daudit.h110 const char *op; member
160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
Dfile.h160 const char *op, u32 request, const char *name,
189 int __aa_path_perm(const char *op, struct aa_profile *profile,
192 int aa_path_perm(const char *op, struct aa_label *label,
199 int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
/security/integrity/ima/
Dima_api.c106 static const char op[] = "add_template_measure"; in ima_store_template() local
116 template_name, op, in ima_store_template()
122 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
135 const char *op, const char *cause) in ima_add_violation() argument
160 op, cause, result, 0); in ima_add_violation()
311 static const char op[] = "add_template_measure"; in ima_store_measurement() local
336 op, audit_cause, result, 0); in ima_store_measurement()
Dima_init.c44 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local
99 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
Dima.h140 const char *op, struct inode *inode,
150 const char *op, const char *cause);
430 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
440 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
Dima_queue.c160 const char *op, struct inode *inode, in ima_add_template_entry() argument
200 op, audit_cause, result, audit_info); in ima_add_template_entry()
Dima_appraise.c382 static const char op[] = "appraise_data"; in ima_appraise_measurement() local
463 op, cause, rc, 0); in ima_appraise_measurement()
483 op, cause, rc, 0); in ima_appraise_measurement()
/security/selinux/include/
Daudit.h26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
/security/selinux/ss/
Dconstraint.h49 u32 op; /* operator */ member
Dservices.c319 switch (e->op) { in constraint_expr_eval()
363 switch (e->op) { in constraint_expr_eval()
389 switch (e->op) { in constraint_expr_eval()
425 switch (e->op) { in constraint_expr_eval()
3570 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3595 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init()
3697 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3736 switch (op) { in selinux_audit_rule_match()
3747 switch (op) { in selinux_audit_rule_match()
3758 switch (op) { in selinux_audit_rule_match()
[all …]
/security/
Dlsm_audit.c261 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data()
263 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data()
270 audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); in dump_common_audit_data()

12