Searched refs:from (Results 1 - 7 of 7) sorted by relevance

/security/integrity/ima/
H A Dima_policy.c503 ima_log_string(ab, "func", args[0].from);
508 if (strcmp(args[0].from, "FILE_CHECK") == 0)
511 else if (strcmp(args[0].from, "PATH_CHECK") == 0)
513 else if (strcmp(args[0].from, "MODULE_CHECK") == 0)
515 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0)
517 else if ((strcmp(args[0].from, "FILE_MMAP") == 0)
518 || (strcmp(args[0].from, "MMAP_CHECK") == 0))
520 else if (strcmp(args[0].from, "BPRM_CHECK") == 0)
528 ima_log_string(ab, "mask", args[0].from);
533 if ((strcmp(args[0].from, "MAY_EXE
[all...]
/security/tomoyo/
H A DMakefile11 @echo initialize_domain /sbin/modprobe from any >> $@
12 @echo initialize_domain /sbin/hotplug from any >> $@
/security/keys/
H A Dtrusted.c172 * verify the AUTH1_COMMAND (Seal) result from TPM
253 * verify the AUTH2_COMMAND (unseal) result from TPM
374 * Prevents a trusted key that is sealed to PCRs from being accessed.
747 opt->pcrinfo_len = strlen(args[0].from) / 2;
750 res = hex2bin(opt->pcrinfo, args[0].from,
756 res = kstrtoul(args[0].from, 16, &handle);
763 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE)
765 res = hex2bin(opt->keyauth, args[0].from,
771 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE)
773 res = hex2bin(opt->blobauth, args[0].from,
[all...]
/security/
H A DKconfig58 derived from IPSec policy. Non-IPSec communications are
104 int "Low address space for LSM to protect from user allocation"
110 from userspace allocation. Keeping a user from writing to low pages
H A Dsecurity.c143 int security_binder_transaction(struct task_struct *from, struct task_struct *to) argument
145 return security_ops->binder_transaction(from, to);
148 int security_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
150 return security_ops->binder_transfer_binder(from, to);
153 int security_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
155 return security_ops->binder_transfer_file(from, to, file);
H A Dcapability.c20 static int cap_binder_transaction(struct task_struct *from, struct task_struct *to) argument
25 static int cap_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
30 static int cap_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
/security/selinux/
H A Dhooks.c649 * from an explicit call and once from the generic calls from the vfs.
1310 /* Called from d_instantiate or d_splice_alias. */
1313 /* Called from selinux_complete_init, try to find a dentry. */
1426 /* Called from d_instantiate or
1430 /* Called from selinux_complete_init, try to
1472 /* Commonly granted from child to parent. */
1644 /* Same as path_has_perm, but uses the inode from the file struct. */
1938 static int selinux_binder_transaction(struct task_struct *from, struc argument
1954 selinux_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
1961 selinux_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
2497 take_option(char **to, char *from, int *first, int len) argument
2508 take_selinux_option(char **to, char *from, int *first, int len) argument
[all...]

Completed in 62 milliseconds