Searched defs:op (Results 1 - 22 of 22) sorted by path

/security/apparmor/
H A Dapparmorfs.c74 * @op: operation doing the user buffer copy
83 static char *aa_simple_write_to_buffer(int op, const char __user *userbuf, argument
99 if (!aa_may_manage_policy(op))
H A Ddomain.c755 int op, error = 0; local
763 op = OP_CHANGE_ONEXEC;
766 op = OP_CHANGE_PROFILE;
846 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request,
H A Dfile.c96 * @op: operation being mediated
107 gfp_t gfp, int op, u32 request, const char *name,
115 aad.op = op,
269 * @op: operation being checked
278 int aa_path_perm(int op, struct aa_profile *profile, struct path *path, argument
303 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, name,
441 * @op: operation being checked
448 int aa_file_perm(int op, struct aa_profile *profile, struct file *file, argument
456 return aa_path_perm(op, profil
106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument
[all...]
H A Dlsm.c155 * @op: operation being checked
162 static int common_perm(int op, struct path *path, u32 mask, argument
170 error = aa_path_perm(op, profile, path, 0, mask, cond);
177 * @op: operation being checked
185 static int common_perm_dir_dentry(int op, struct path *dir, argument
191 return common_perm(op, &path, mask, cond);
196 * @op: operation being checked
203 static int common_perm_mnt_dentry(int op, struct vfsmount *mnt, argument
211 return common_perm(op, &path, mask, &cond);
216 * @op
223 common_perm_rm(int op, struct path *dir, struct dentry *dentry, u32 mask) argument
248 common_perm_create(int op, struct path *dir, struct dentry *dentry, u32 mask, umode_t mode) argument
426 common_file_perm(int op, struct file *file, u32 mask) argument
469 common_mmap(int op, struct file *file, unsigned long prot, unsigned long flags) argument
[all...]
H A Dpolicy.c895 * @op: policy operation being performed
903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, argument
910 aad.op = op;
921 * @op: the policy manipulation operation being done
925 bool aa_may_manage_policy(int op) argument
929 audit_policy(op, GFP_KERNEL, NULL, "policy_locked", -EACCES);
934 audit_policy(op, GFP_KERNEL, NULL, "not policy admin", -EACCES);
1073 int op = OP_PROF_REPL; local
1164 op
[all...]
H A Dprocattr.c84 * @op: operation being checked
90 static char *split_token_from_name(int op, char *args, u64 * token) argument
96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args);
/security/apparmor/include/
H A Daudit.h107 int op; member in struct:apparmor_audit_data
/security/
H A Dcapability.c921 static int cap_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) argument
931 static int cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, argument
H A Dsecurity.c1473 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) argument
1475 return security_ops->audit_rule_init(field, op, rulestr, lsmrule);
1488 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, argument
1491 return security_ops->audit_rule_match(secid, field, op, lsmrule, actx);
/security/integrity/ima/
H A Dima.h98 const char *op, struct inode *inode,
106 const char *op, const char *cause);
234 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, argument
240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, argument
H A Dima_api.c95 static const char op[] = "add_template_measure"; local
114 template_name, op,
120 result = ima_add_template_entry(entry, violation, op, inode, filename);
132 const char *op, const char *cause)
153 op, cause, result, 0);
266 static const char op[] = "add_template_measure"; local
280 op, audit_cause, result, 0);
131 ima_add_violation(struct file *file, const unsigned char *filename, const char *op, const char *cause) argument
H A Dima_appraise.c190 static const char op[] = "appraise_data"; local
279 op, cause, rc, 0);
H A Dima_init.c48 static const char op[] = "add_boot_aggregate"; local
89 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op,
H A Dima_policy.c359 static const char op[] = "policy_update"; local
371 NULL, op, cause, result, audit_info);
683 static const char op[] = "update_policy"; local
692 NULL, op, "already-exists",
700 NULL, op, "-ENOMEM", -ENOMEM, audit_info);
718 NULL, op, "invalid-policy", result,
H A Dima_queue.c109 const char *op, struct inode *inode,
148 op, audit_cause, result, audit_info);
108 ima_add_template_entry(struct ima_template_entry *entry, int violation, const char *op, struct inode *inode, const unsigned char *filename) argument
/security/integrity/
H A Dintegrity.h163 const unsigned char *fname, const char *op,
168 const char *op, const char *cause,
166 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info) argument
H A Dintegrity_audit.c32 const unsigned char *fname, const char *op,
48 audit_log_format(ab, " op=");
49 audit_log_string(ab, op);
31 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int audit_info) argument
/security/keys/
H A Drequest_key.c92 * - execute "/sbin/request-key <op> <key> <uid> <gid> <keyring> <keyring> <keyring>"
95 const char *op,
107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op);
165 argv[i++] = (char *) op;
94 call_sbin_request_key(struct key_construction *cons, const char *op, void *aux) argument
/security/selinux/ss/
H A Davtab.h60 struct operation_perm op; member in struct:avtab_operation
H A Dconstraint.h26 #define CEXPR_ATTR 4 /* attr op attr */
27 #define CEXPR_NAMES 5 /* attr op names */
48 u32 op; /* operator */ member in struct:constraint_expr
H A Dservices.c318 switch (e->op) {
362 switch (e->op) {
388 switch (e->op) {
424 switch (e->op) {
511 audit_log_format(ab, "op=security_compute_av reason=%s "
630 ops->type[i] |= node->datum.u.ops->op.perms[i];
766 "op=security_validate_transition seresult=denied"
914 "op=security_bounded_transition "
946 if (!security_operation_test(node->datum.u.ops->op.perms,
967 node->datum.u.ops->op
3015 selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) argument
3136 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
[all...]
/security/smack/
H A Dsmack_lsm.c552 char *op; local
562 for (op = data; op != NULL; op = commap) {
563 commap = strchr(op, ',');
567 if (strncmp(op, SMK_FSHAT, strlen(SMK_FSHAT)) == 0) {
568 op += strlen(SMK_FSHAT);
569 skp = smk_import_entry(op, 0);
574 } else if (strncmp(op, SMK_FSFLOOR, strlen(SMK_FSFLOOR)) == 0) {
575 op
3908 smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) argument
3961 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
[all...]

Completed in 1122 milliseconds