/security/ |
H A D | capability.c | 942 #define set_to_cap_if_null(ops, function) \ 944 if (!ops->function) { \ 945 ops->function = cap_##function; \ 951 void __init security_fixup_ops(struct security_operations *ops) argument 953 set_to_cap_if_null(ops, binder_set_context_mgr); 954 set_to_cap_if_null(ops, binder_transaction); 955 set_to_cap_if_null(ops, binder_transfer_binder); 956 set_to_cap_if_null(ops, binder_transfer_file); 957 set_to_cap_if_null(ops, ptrace_access_check); 958 set_to_cap_if_null(ops, ptrace_tracem [all...] |
H A D | security.c | 41 static inline int __init verify(struct security_operations *ops) argument 44 if (!ops) 46 security_fixup_ops(ops); 91 * @ops: a pointer to the struct security_operations that is to be checked. 103 int __init security_module_enable(struct security_operations *ops) argument 105 return !strcmp(ops->name, chosen_lsm); 110 * @ops: a pointer to the struct security_options that is to be registered 113 * kernel security subsystem. Some rudimentary checking is done on the @ops 115 * is allowed to register its @ops by calling security_module_enable(@ops) 120 register_security(struct security_operations *ops) argument [all...] |
/security/selinux/ss/ |
H A D | services.h | 14 void services_compute_operation_type(struct operation *ops,
|
H A D | avtab.c | 41 struct avtab_operation *ops; local 48 ops = kmem_cache_zalloc(avtab_operation_cachep, GFP_KERNEL); 49 if (ops == NULL) { 53 *ops = *(datum->u.ops); 54 newnode->datum.u.ops = ops; 254 temp->datum.u.ops); 362 struct avtab_operation ops; local 363 __le32 buf32[ARRAY_SIZE(ops [all...] |
H A D | conditional.h | 77 struct av_decision *avd, struct operation *ops);
|
H A D | avtab.h | 66 struct avtab_operation *ops; /* ioctl operations */ member in union:avtab_datum::__anon26
|
H A D | services.c | 99 struct operation *ops); 621 struct operation *ops, 629 for (i = 0; i < ARRAY_SIZE(ops->type); i++) 630 ops->type[i] |= node->datum.u.ops->op.perms[i]; 633 type = node->datum.u.ops->type; 634 security_operation_set(ops->type, type); 640 ops->len = 1; 651 struct operation *ops) 665 if (ops) { 620 services_compute_operation_type( struct operation *ops, struct avtab_node *node) argument 647 context_struct_compute_av(struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct operation *ops) argument 1073 security_compute_av(u32 ssid, u32 tsid, u16 orig_tclass, struct av_decision *avd, struct operation *ops) argument [all...] |
H A D | conditional.c | 637 struct av_decision *avd, struct operation *ops) 641 if (!ctab || !key || !avd || !ops) 662 services_compute_operation_type(ops, node); 636 cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd, struct operation *ops) argument
|
/security/selinux/ |
H A D | avc.c | 75 struct operation ops; member in struct:avc_operation_node 278 security_operation_set(node->ops.type, type); 393 node->ae.ops_node->ops.len++; 404 struct avc_operation_node *ops; local 406 ops = kmem_cache_zalloc(avc_operation_node_cachep, 408 if (!ops) 409 return ops; 410 INIT_LIST_HEAD(&ops->od_head); 411 return ops; 421 if (src->ops [all...] |
H A D | hooks.c | 4896 static unsigned int selinux_ipv4_forward(const struct nf_hook_ops *ops, argument 4906 static unsigned int selinux_ipv6_forward(const struct nf_hook_ops *ops, argument 4958 static unsigned int selinux_ipv4_output(const struct nf_hook_ops *ops, argument 5135 static unsigned int selinux_ipv4_postroute(const struct nf_hook_ops *ops, argument 5145 static unsigned int selinux_ipv6_postroute(const struct nf_hook_ops *ops, argument
|
H A D | selinuxfs.c | 1486 inode->i_fop = files[i].ops;
|
/security/selinux/include/ |
H A D | security.h | 143 struct operation *ops);
|
/security/tomoyo/ |
H A D | network.c | 656 const int error = sock->ops->getname(sock, (struct sockaddr *)
|