/security/apparmor/ |
D | net.c | 134 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument 138 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm() 145 static int aa_label_sk_perm(struct aa_label *label, const char *op, u32 request, in aa_label_sk_perm() argument 155 DEFINE_AUDIT_SK(sa, op, sk); in aa_label_sk_perm() 164 int aa_sk_perm(const char *op, u32 request, struct sock *sk) in aa_sk_perm() argument 174 error = aa_label_sk_perm(label, op, request, sk); in aa_sk_perm() 181 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, in aa_sock_file_perm() argument 188 return aa_label_sk_perm(label, op, request, sock->sk); in aa_sock_file_perm() 246 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request, in apparmor_secmark_check() argument 250 DEFINE_AUDIT_SK(sa, op, sk); in apparmor_secmark_check()
|
D | file.c | 93 const char *op, u32 request, const char *name, in aa_audit_file() argument 98 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_TASK, op); in aa_audit_file() 157 static int path_name(const char *op, struct aa_label *label, in path_name() argument 169 aa_audit_file(profile, &nullperms, op, request, *name, in path_name() 268 int __aa_path_perm(const char *op, struct aa_profile *profile, const char *name, in __aa_path_perm() argument 279 return aa_audit_file(profile, perms, op, request, name, NULL, NULL, in __aa_path_perm() 284 static int profile_path_perm(const char *op, struct aa_profile *profile, in profile_path_perm() argument 295 error = path_name(op, &profile->label, path, in profile_path_perm() 300 return __aa_path_perm(op, profile, name, request, cond, flags, in profile_path_perm() 315 int aa_path_perm(const char *op, struct aa_label *label, in aa_path_perm() argument [all …]
|
D | audit.c | 64 if (aad(sa)->op) { in audit_pre() 65 audit_log_format(ab, " operation=\"%s\"", aad(sa)->op); in audit_pre() 176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 182 if (op != Audit_equal && op != Audit_not_equal) in aa_audit_rule_init() 223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 239 switch (op) { in aa_audit_rule_match()
|
D | policy.c | 618 static int audit_policy(struct aa_label *label, const char *op, in audit_policy() argument 622 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, op); in audit_policy() 683 const char *op; in aa_may_manage_policy() local 686 op = OP_PROF_RM; in aa_may_manage_policy() 688 op = OP_PROF_REPL; in aa_may_manage_policy() 690 op = OP_PROF_LOAD; in aa_may_manage_policy() 694 return audit_policy(label, op, NULL, NULL, "policy_locked", in aa_may_manage_policy() 698 return audit_policy(label, op, NULL, NULL, "not policy admin", in aa_may_manage_policy() 864 const char *op; in aa_replace_profiles() local 868 op = mask & AA_MAY_REPLACE_POLICY ? OP_PROF_REPL : OP_PROF_LOAD; in aa_replace_profiles() [all …]
|
D | lsm.c | 203 static int common_perm(const char *op, const struct path *path, u32 mask, in common_perm() argument 211 error = aa_path_perm(op, label, path, 0, mask, cond); in common_perm() 225 static int common_perm_cond(const char *op, const struct path *path, u32 mask) in common_perm_cond() argument 236 return common_perm(op, path, mask, &cond); in common_perm_cond() 249 static int common_perm_dir_dentry(const char *op, const struct path *dir, in common_perm_dir_dentry() argument 255 return common_perm(op, &path, mask, cond); in common_perm_dir_dentry() 267 static int common_perm_rm(const char *op, const struct path *dir, in common_perm_rm() argument 280 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_rm() 293 static int common_perm_create(const char *op, const struct path *dir, in common_perm_create() argument 301 return common_perm_dir_dentry(op, dir, dentry, mask, &cond); in common_perm_create() [all …]
|
D | procattr.c | 78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 84 AA_ERROR("%s: Invalid input '%s'", op, args); in split_token_from_name()
|
D | domain.c | 1261 static int change_profile_perms_wrapper(const char *op, const char *name, in change_profile_perms_wrapper() argument 1273 error = aa_audit_file(profile, perms, op, request, name, in change_profile_perms_wrapper() 1304 char *op; in aa_change_profile() local 1328 op = OP_STACK_ONEXEC; in aa_change_profile() 1330 op = OP_CHANGE_ONEXEC; in aa_change_profile() 1334 op = OP_STACK; in aa_change_profile() 1336 op = OP_CHANGE_PROFILE; in aa_change_profile() 1379 change_profile_perms_wrapper(op, auditname, in aa_change_profile() 1450 aa_audit_file(profile, &perms, op, request, auditname, in aa_change_profile()
|
/security/keys/ |
D | keyctl_pkey.c | 115 int op, in keyctl_pkey_params_get_2() argument 136 switch (op) { in keyctl_pkey_params_get_2() 212 long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument 222 ret = keyctl_pkey_params_get_2(_params, _info, op, ¶ms); in keyctl_pkey_e_d_s() 230 switch (op) { in keyctl_pkey_e_d_s() 232 params.op = kernel_pkey_encrypt; in keyctl_pkey_e_d_s() 235 params.op = kernel_pkey_decrypt; in keyctl_pkey_e_d_s() 238 params.op = kernel_pkey_sign; in keyctl_pkey_e_d_s() 318 params.op = kernel_pkey_verify; in keyctl_pkey_verify()
|
D | request_key_auth.c | 161 struct key *request_key_auth_new(struct key *target, const char *op, in request_key_auth_new() argument 181 strlcpy(rka->op, op, sizeof(rka->op)); in request_key_auth_new()
|
D | internal.h | 216 const char *op, 347 static inline long keyctl_pkey_e_d_s(int op, in keyctl_pkey_e_d_s() argument
|
D | request_key.c | 130 kenter("{%d},{%d},%s", key->serial, authkey->serial, rka->op); in call_sbin_request_key() 186 argv[i++] = (char *)rka->op; in call_sbin_request_key()
|
/security/integrity/ |
D | integrity_audit.c | 29 const unsigned char *fname, const char *op, in integrity_audit_msg() argument 32 integrity_audit_message(audit_msgno, inode, fname, op, cause, in integrity_audit_msg() 37 const unsigned char *fname, const char *op, in integrity_audit_message() argument 56 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_message()
|
D | integrity.h | 241 const unsigned char *fname, const char *op, 245 const unsigned char *fname, const char *op, 258 const char *op, const char *cause, in integrity_audit_msg() argument 266 const char *op, const char *cause, in integrity_audit_message() argument
|
/security/apparmor/include/ |
D | net.h | 94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, 104 int aa_sk_perm(const char *op, u32 request, struct sock *sk); 106 int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, 109 int apparmor_secmark_check(struct aa_label *label, char *op, u32 request,
|
D | audit.h | 110 const char *op; member 160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \ 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule); 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|
D | file.h | 160 const char *op, u32 request, const char *name, 189 int __aa_path_perm(const char *op, struct aa_profile *profile, 192 int aa_path_perm(const char *op, struct aa_label *label, 199 int aa_file_perm(const char *op, struct aa_label *label, struct file *file,
|
/security/integrity/ima/ |
D | ima_api.c | 106 static const char op[] = "add_template_measure"; in ima_store_template() local 116 template_name, op, in ima_store_template() 122 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template() 135 const char *op, const char *cause) in ima_add_violation() argument 160 op, cause, result, 0); in ima_add_violation() 311 static const char op[] = "add_template_measure"; in ima_store_measurement() local 336 op, audit_cause, result, 0); in ima_store_measurement()
|
D | ima_init.c | 44 static const char op[] = "add_boot_aggregate"; in ima_add_boot_aggregate() local 99 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op, in ima_add_boot_aggregate()
|
D | ima.h | 140 const char *op, struct inode *inode, 150 const char *op, const char *cause); 430 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument 440 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
|
D | ima_queue.c | 160 const char *op, struct inode *inode, in ima_add_template_entry() argument 200 op, audit_cause, result, audit_info); in ima_add_template_entry()
|
D | ima_appraise.c | 382 static const char op[] = "appraise_data"; in ima_appraise_measurement() local 463 op, cause, rc, 0); in ima_appraise_measurement() 483 op, cause, rc, 0); in ima_appraise_measurement()
|
/security/selinux/include/ |
D | audit.h | 26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/selinux/ss/ |
D | constraint.h | 49 u32 op; /* operator */ member
|
D | services.c | 319 switch (e->op) { in constraint_expr_eval() 363 switch (e->op) { in constraint_expr_eval() 389 switch (e->op) { in constraint_expr_eval() 425 switch (e->op) { in constraint_expr_eval() 3570 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3595 if (op != Audit_equal && op != Audit_not_equal) in selinux_audit_rule_init() 3697 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3736 switch (op) { in selinux_audit_rule_match() 3747 switch (op) { in selinux_audit_rule_match() 3758 switch (op) { in selinux_audit_rule_match() [all …]
|
/security/ |
D | lsm_audit.c | 261 audit_log_d_path(ab, " path=", &a->u.op->path); in dump_common_audit_data() 263 inode = a->u.op->path.dentry->d_inode; in dump_common_audit_data() 270 audit_log_format(ab, " ioctlcmd=0x%hx", a->u.op->cmd); in dump_common_audit_data()
|