/security/ |
H A D | lsm_audit.c | 242 audit_log_format(ab, " dev="); 255 audit_log_format(ab, " dev="); 271 audit_log_format(ab, " dev="); 289 audit_log_format(ab, " dev="); 374 struct net_device *dev; local 377 dev = dev_get_by_index(&init_net, a->u.net->netif); 378 if (dev) { 379 audit_log_format(ab, " netif=%s", dev->name); 380 dev_put(dev);
|
H A D | device_cgroup.c | 390 * @dev_cgroup: dev cgroup to be tested against 804 * @dev_cgroup: the dev cgroup to be tested against 853 int devcgroup_inode_mknod(int mode, dev_t dev) argument 865 return __devcgroup_check_permission(type, MAJOR(dev), MINOR(dev),
|
H A D | capability.c | 193 umode_t mode, dev_t dev) 270 unsigned int dev) 192 cap_inode_mknod(struct inode *inode, struct dentry *dentry, umode_t mode, dev_t dev) argument 269 cap_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, unsigned int dev) argument
|
H A D | security.c | 27 #include <linux/backing-dev.h> 408 unsigned int dev) 412 return security_ops->path_mknod(dir, dentry, mode, dev); 548 int security_inode_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev) argument 552 return security_ops->inode_mknod(dir, dentry, mode, dev); 407 security_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, unsigned int dev) argument
|
/security/selinux/ |
H A D | netif.c | 141 struct net_device *dev; local 146 dev = dev_get_by_index(ns, ifindex); 147 if (unlikely(dev == NULL)) { 166 ret = security_netif_sid(dev->name, &new->nsec.sid); 178 dev_put(dev); 264 struct net_device *dev = netdev_notifier_info_to_dev(ptr); local 267 sel_netif_kill(dev_net(dev), dev->ifindex);
|
H A D | hooks.c | 430 printk(KERN_WARNING "SELinux: (dev %s, type %s) has no " 438 printk(KERN_WARNING "SELinux: (dev %s, type " 442 printk(KERN_WARNING "SELinux: (dev %s, type " 450 printk(KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n", 453 printk(KERN_DEBUG "SELinux: initialized (dev %s, type %s), %s\n", 676 "(%s) failed for (dev %s, type %s) errno=%d\n", 829 "security settings for (dev %s, type %s)\n", sb->s_id, name); 858 "different security settings for (dev %s, " 1365 "%d for dev=%s ino=%ld\n", __func__, 1378 char *dev local 2845 selinux_inode_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev) argument [all...] |
/security/tomoyo/ |
H A D | realpath.c | 183 const dev_t dev = sb->s_dev; local 185 snprintf(name, sizeof(name) - 1, "dev(%u,%u):", MAJOR(dev), 186 MINOR(dev));
|
H A D | audit.c | 185 unsigned int dev; local 190 dev = stat->dev; 209 MAJOR(dev), MINOR(dev), 212 dev = stat->rdev; 216 MAJOR(dev), MINOR(dev));
|
H A D | file.c | 837 * @dev: Device number. 842 const unsigned int mode, unsigned int dev) 859 dev = new_decode_dev(dev); 864 r.param.mkdev.major = MAJOR(dev); 865 r.param.mkdev.minor = MINOR(dev); 841 tomoyo_mkdev_perm(const u8 operation, struct path *path, const unsigned int mode, unsigned int dev) argument
|
H A D | tomoyo.c | 232 * @dev: Device attributes. 237 umode_t mode, unsigned int dev) 253 return tomoyo_mkdev_perm(type, &path, perm, dev); 236 tomoyo_path_mknod(struct path *parent, struct dentry *dentry, umode_t mode, unsigned int dev) argument
|
H A D | common.h | 482 const struct tomoyo_path_info *dev; member in struct:tomoyo_request_info::__anon33::__anon41 568 dev_t dev; member in struct:tomoyo_mini_stat 972 const unsigned int mode, unsigned int dev);
|
/security/apparmor/ |
H A D | lsm.c | 277 umode_t mode, unsigned int dev) 276 apparmor_path_mknod(struct path *dir, struct dentry *dentry, umode_t mode, unsigned int dev) argument
|