/security/apparmor/ |
H A D | Makefile | 35 # and build a second integer table (with the second sed cmd), that maps 67 $(call cmd,make-caps) 70 $(call cmd,make-rlim)
|
H A D | lsm.c | 459 static int apparmor_file_lock(struct file *file, unsigned int cmd) argument 463 if (cmd == F_WRLCK)
|
/security/selinux/ |
H A D | avc.c | 253 u16 cmd, u8 specified) 256 u8 num = cmd & 0xff; 270 static void avc_operation_allow_perm(struct avc_operation_node *node, u16 cmd) argument 276 type = cmd >> 8; 277 num = cmd & 0xff; 333 static inline void avc_quick_copy_operation_decision(u16 cmd, argument 341 u8 i = (0xff & cmd) >> 5; 449 u16 cmd, 459 if (avc_operation_has_perm(od, cmd, 468 if (!avc_operation_has_perm(od, cmd, 252 avc_operation_has_perm(struct operation_decision *od, u16 cmd, u8 specified) argument 446 avc_operation_audit_required(u32 requested, struct av_decision *avd, struct operation_decision *od, u16 cmd, int result, u32 *deniedp) argument 478 avc_operation_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct operation_decision *od, u16 cmd, int result, struct common_audit_data *ad) argument 834 avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct operation_decision *od, u32 flags) argument 995 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u16 cmd, unsigned flags, struct av_decision *avd) argument 1021 avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested, u16 cmd, struct common_audit_data *ad) argument [all...] |
H A D | hooks.c | 3242 * Check whether a task has the ioctl permission and cmd 3246 u32 requested, u16 cmd) 3258 ad.u.op->cmd = cmd; 3274 requested, cmd, &ad); 3279 static int selinux_file_ioctl(struct file *file, unsigned int cmd, argument 3285 switch (cmd) { 3321 error = ioctl_has_perm(cred, file, FILE__IOCTL, (u16) cmd); 3427 static int selinux_file_lock(struct file *file, unsigned int cmd) argument 3434 static int selinux_file_fcntl(struct file *file, unsigned int cmd, argument 3245 ioctl_has_perm(const struct cred *cred, struct file *file, u32 requested, u16 cmd) argument 5287 selinux_msg_queue_msgctl(struct msg_queue *msq, int cmd) argument 5429 selinux_shm_shmctl(struct shmid_kernel *shp, int cmd) argument 5521 selinux_sem_semctl(struct sem_array *sma, int cmd) argument [all...] |
/security/tomoyo/ |
H A D | tomoyo.c | 307 * @cmd: Command for fcntl(). 308 * @arg: Argument for @cmd. 312 static int tomoyo_file_fcntl(struct file *file, unsigned int cmd, argument 315 if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND))) 342 * @cmd: Command for ioctl(). 343 * @arg: Argument for @cmd. 347 static int tomoyo_file_ioctl(struct file *file, unsigned int cmd, argument 350 return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd);
|
/security/ |
H A D | security.c | 727 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg) argument 729 return security_ops->file_ioctl(file, cmd, arg); 788 int security_file_lock(struct file *file, unsigned int cmd) argument 790 return security_ops->file_lock(file, cmd); 793 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg) argument 795 return security_ops->file_fcntl(file, cmd, arg); 1020 int security_msg_queue_msgctl(struct msg_queue *msq, int cmd) argument 1022 return security_ops->msg_queue_msgctl(msq, cmd); 1052 int security_shm_shmctl(struct shmid_kernel *shp, int cmd) argument 1054 return security_ops->shm_shmctl(shp, cmd); 1077 security_sem_semctl(struct sem_array *sma, int cmd) argument [all...] |
H A D | capability.c | 355 static int cap_file_lock(struct file *file, unsigned int cmd) argument 360 static int cap_file_fcntl(struct file *file, unsigned int cmd, argument 528 static int cap_msg_queue_msgctl(struct msg_queue *msq, int cmd) argument 559 static int cap_shm_shmctl(struct shmid_kernel *shp, int cmd) argument 584 static int cap_sem_semctl(struct sem_array *sma, int cmd) argument
|
H A D | lsm_audit.c | 260 audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd);
|
/security/selinux/include/ |
H A D | avc.h | 156 u16 cmd, struct common_audit_data *ad);
|
/security/smack/ |
H A D | smack_lsm.c | 1371 * @cmd: what to do 1378 static int smack_file_ioctl(struct file *file, unsigned int cmd, argument 1387 if (_IOC_DIR(cmd) & _IOC_WRITE) { 1392 if (rc == 0 && (_IOC_DIR(cmd) & _IOC_READ)) { 1403 * @cmd: unused 1407 static int smack_file_lock(struct file *file, unsigned int cmd) argument 1422 * @cmd: what action to check 1431 static int smack_file_fcntl(struct file *file, unsigned int cmd, argument 1438 switch (cmd) { 2629 * @cmd 2633 smack_shm_shmctl(struct shmid_kernel *shp, int cmd) argument 2760 smack_sem_semctl(struct sem_array *sma, int cmd) argument 2893 smack_msg_queue_msgctl(struct msg_queue *msq, int cmd) argument [all...] |
/security/keys/ |
H A D | trusted.c | 357 static int trusted_tpm_send(const u32 chip_num, unsigned char *cmd, argument 362 dump_tpm_buf(cmd); 363 rc = tpm_send(chip_num, cmd, buflen); 364 dump_tpm_buf(cmd);
|