Searched refs:from (Results 1 - 7 of 7) sorted by relevance
/security/integrity/ima/ |
H A D | ima_policy.c | 503 ima_log_string(ab, "func", args[0].from); 508 if (strcmp(args[0].from, "FILE_CHECK") == 0) 511 else if (strcmp(args[0].from, "PATH_CHECK") == 0) 513 else if (strcmp(args[0].from, "MODULE_CHECK") == 0) 515 else if (strcmp(args[0].from, "FIRMWARE_CHECK") == 0) 517 else if ((strcmp(args[0].from, "FILE_MMAP") == 0) 518 || (strcmp(args[0].from, "MMAP_CHECK") == 0)) 520 else if (strcmp(args[0].from, "BPRM_CHECK") == 0) 528 ima_log_string(ab, "mask", args[0].from); 533 if ((strcmp(args[0].from, "MAY_EXE [all...] |
/security/tomoyo/ |
H A D | Makefile | 11 @echo initialize_domain /sbin/modprobe from any >> $@ 12 @echo initialize_domain /sbin/hotplug from any >> $@
|
/security/keys/ |
H A D | trusted.c | 172 * verify the AUTH1_COMMAND (Seal) result from TPM 253 * verify the AUTH2_COMMAND (unseal) result from TPM 374 * Prevents a trusted key that is sealed to PCRs from being accessed. 747 opt->pcrinfo_len = strlen(args[0].from) / 2; 750 res = hex2bin(opt->pcrinfo, args[0].from, 756 res = kstrtoul(args[0].from, 16, &handle); 763 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) 765 res = hex2bin(opt->keyauth, args[0].from, 771 if (strlen(args[0].from) != 2 * SHA1_DIGEST_SIZE) 773 res = hex2bin(opt->blobauth, args[0].from, [all...] |
/security/ |
H A D | Kconfig | 58 derived from IPSec policy. Non-IPSec communications are 104 int "Low address space for LSM to protect from user allocation" 110 from userspace allocation. Keeping a user from writing to low pages
|
H A D | security.c | 143 int security_binder_transaction(struct task_struct *from, struct task_struct *to) argument 145 return security_ops->binder_transaction(from, to); 148 int security_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 150 return security_ops->binder_transfer_binder(from, to); 153 int security_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument 155 return security_ops->binder_transfer_file(from, to, file);
|
H A D | capability.c | 20 static int cap_binder_transaction(struct task_struct *from, struct task_struct *to) argument 25 static int cap_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 30 static int cap_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
|
/security/selinux/ |
H A D | hooks.c | 649 * from an explicit call and once from the generic calls from the vfs. 1310 /* Called from d_instantiate or d_splice_alias. */ 1313 /* Called from selinux_complete_init, try to find a dentry. */ 1426 /* Called from d_instantiate or 1430 /* Called from selinux_complete_init, try to 1472 /* Commonly granted from child to parent. */ 1644 /* Same as path_has_perm, but uses the inode from the file struct. */ 1938 static int selinux_binder_transaction(struct task_struct *from, struc argument 1954 selinux_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 1961 selinux_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument 2497 take_option(char **to, char *from, int *first, int len) argument 2508 take_selinux_option(char **to, char *from, int *first, int len) argument [all...] |
Completed in 62 milliseconds