/security/apparmor/ |
H A D | apparmorfs.c | 74 * @op: operation doing the user buffer copy 83 static char *aa_simple_write_to_buffer(int op, const char __user *userbuf, argument 99 if (!aa_may_manage_policy(op))
|
H A D | domain.c | 755 int op, error = 0; local 763 op = OP_CHANGE_ONEXEC; 766 op = OP_CHANGE_PROFILE; 846 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request,
|
H A D | file.c | 96 * @op: operation being mediated 107 gfp_t gfp, int op, u32 request, const char *name, 115 aad.op = op, 269 * @op: operation being checked 278 int aa_path_perm(int op, struct aa_profile *profile, struct path *path, argument 303 error = aa_audit_file(profile, &perms, GFP_KERNEL, op, request, name, 441 * @op: operation being checked 448 int aa_file_perm(int op, struct aa_profile *profile, struct file *file, argument 456 return aa_path_perm(op, profil 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument [all...] |
H A D | lsm.c | 155 * @op: operation being checked 162 static int common_perm(int op, struct path *path, u32 mask, argument 170 error = aa_path_perm(op, profile, path, 0, mask, cond); 177 * @op: operation being checked 185 static int common_perm_dir_dentry(int op, struct path *dir, argument 191 return common_perm(op, &path, mask, cond); 196 * @op: operation being checked 203 static int common_perm_mnt_dentry(int op, struct vfsmount *mnt, argument 211 return common_perm(op, &path, mask, &cond); 216 * @op 223 common_perm_rm(int op, struct path *dir, struct dentry *dentry, u32 mask) argument 248 common_perm_create(int op, struct path *dir, struct dentry *dentry, u32 mask, umode_t mode) argument 426 common_file_perm(int op, struct file *file, u32 mask) argument 469 common_mmap(int op, struct file *file, unsigned long prot, unsigned long flags) argument [all...] |
H A D | policy.c | 895 * @op: policy operation being performed 903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, argument 910 aad.op = op; 921 * @op: the policy manipulation operation being done 925 bool aa_may_manage_policy(int op) argument 929 audit_policy(op, GFP_KERNEL, NULL, "policy_locked", -EACCES); 934 audit_policy(op, GFP_KERNEL, NULL, "not policy admin", -EACCES); 1073 int op = OP_PROF_REPL; local 1164 op [all...] |
H A D | procattr.c | 84 * @op: operation being checked 90 static char *split_token_from_name(int op, char *args, u64 * token) argument 96 AA_ERROR("%s: Invalid input '%s'", op_table[op], args);
|
/security/apparmor/include/ |
H A D | audit.h | 107 int op; member in struct:apparmor_audit_data
|
/security/ |
H A D | capability.c | 921 static int cap_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) argument 931 static int cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, argument
|
H A D | security.c | 1473 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) argument 1475 return security_ops->audit_rule_init(field, op, rulestr, lsmrule); 1488 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, argument 1491 return security_ops->audit_rule_match(secid, field, op, lsmrule, actx);
|
/security/integrity/ima/ |
H A D | ima.h | 98 const char *op, struct inode *inode, 106 const char *op, const char *cause); 234 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, argument 240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, argument
|
H A D | ima_api.c | 95 static const char op[] = "add_template_measure"; local 114 template_name, op, 120 result = ima_add_template_entry(entry, violation, op, inode, filename); 132 const char *op, const char *cause) 153 op, cause, result, 0); 266 static const char op[] = "add_template_measure"; local 280 op, audit_cause, result, 0); 131 ima_add_violation(struct file *file, const unsigned char *filename, const char *op, const char *cause) argument
|
H A D | ima_appraise.c | 190 static const char op[] = "appraise_data"; local 279 op, cause, rc, 0);
|
H A D | ima_init.c | 48 static const char op[] = "add_boot_aggregate"; local 89 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op,
|
H A D | ima_policy.c | 359 static const char op[] = "policy_update"; local 371 NULL, op, cause, result, audit_info); 683 static const char op[] = "update_policy"; local 692 NULL, op, "already-exists", 700 NULL, op, "-ENOMEM", -ENOMEM, audit_info); 718 NULL, op, "invalid-policy", result,
|
H A D | ima_queue.c | 109 const char *op, struct inode *inode, 148 op, audit_cause, result, audit_info); 108 ima_add_template_entry(struct ima_template_entry *entry, int violation, const char *op, struct inode *inode, const unsigned char *filename) argument
|
/security/integrity/ |
H A D | integrity.h | 163 const unsigned char *fname, const char *op, 168 const char *op, const char *cause, 166 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info) argument
|
H A D | integrity_audit.c | 32 const unsigned char *fname, const char *op, 48 audit_log_format(ab, " op="); 49 audit_log_string(ab, op); 31 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int audit_info) argument
|
/security/keys/ |
H A D | request_key.c | 92 * - execute "/sbin/request-key <op> <key> <uid> <gid> <keyring> <keyring> <keyring>" 95 const char *op, 107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); 165 argv[i++] = (char *) op; 94 call_sbin_request_key(struct key_construction *cons, const char *op, void *aux) argument
|
/security/selinux/ss/ |
H A D | avtab.h | 60 struct operation_perm op; member in struct:avtab_operation
|
H A D | constraint.h | 26 #define CEXPR_ATTR 4 /* attr op attr */ 27 #define CEXPR_NAMES 5 /* attr op names */ 48 u32 op; /* operator */ member in struct:constraint_expr
|
H A D | services.c | 318 switch (e->op) { 362 switch (e->op) { 388 switch (e->op) { 424 switch (e->op) { 511 audit_log_format(ab, "op=security_compute_av reason=%s " 630 ops->type[i] |= node->datum.u.ops->op.perms[i]; 766 "op=security_validate_transition seresult=denied" 914 "op=security_bounded_transition " 946 if (!security_operation_test(node->datum.u.ops->op.perms, 967 node->datum.u.ops->op 3015 selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) argument 3136 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument [all...] |
/security/smack/ |
H A D | smack_lsm.c | 552 char *op; local 562 for (op = data; op != NULL; op = commap) { 563 commap = strchr(op, ','); 567 if (strncmp(op, SMK_FSHAT, strlen(SMK_FSHAT)) == 0) { 568 op += strlen(SMK_FSHAT); 569 skp = smk_import_entry(op, 0); 574 } else if (strncmp(op, SMK_FSFLOOR, strlen(SMK_FSFLOOR)) == 0) { 575 op 3908 smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) argument 3961 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument [all...] |