Lines Matching refs:cmd
2931 * @cmd: ioctl cmd
2941 int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
2943 return call_int_hook(file_ioctl, file, cmd, arg);
2950 * @cmd: ioctl cmd
2958 int security_file_ioctl_compat(struct file *file, unsigned int cmd,
2961 return call_int_hook(file_ioctl_compat, file, cmd, arg);
3048 * @cmd: lock operation (e.g. F_RDLCK, F_WRLCK)
3055 int security_file_lock(struct file *file, unsigned int cmd)
3057 return call_int_hook(file_lock, file, cmd);
3063 * @cmd: fcntl command
3066 * Check permission before allowing the file operation specified by @cmd from
3074 int security_file_fcntl(struct file *file, unsigned int cmd, unsigned long arg)
3076 return call_int_hook(file_fcntl, file, cmd, arg);
3881 * @cmd: operation
3883 * Check permission when a message control operation specified by @cmd is to be
3888 int security_msg_queue_msgctl(struct kern_ipc_perm *msq, int cmd)
3890 return call_int_hook(msg_queue_msgctl, msq, cmd);
3985 * @cmd: operation
3987 * Check permission when a shared memory control operation specified by @cmd is
3992 int security_shm_shmctl(struct kern_ipc_perm *shp, int cmd)
3994 return call_int_hook(shm_shmctl, shp, cmd);
4068 * @cmd: operation
4070 * Check permission when a semaphore operation specified by @cmd is to be
4075 int security_sem_semctl(struct kern_ipc_perm *sma, int cmd)
4077 return call_int_hook(sem_semctl, sma, cmd);
5657 * @cmd: command
5664 * check the specific cmd they need.
5668 int security_bpf(int cmd, union bpf_attr *attr, unsigned int size, bool kernel)
5670 return call_int_hook(bpf, cmd, attr, size, kernel);
5760 * @cmd: BPF syscall command requested to be delegated by BPF token
5767 int security_bpf_token_cmd(const struct bpf_token *token, enum bpf_cmd cmd)
5769 return call_int_hook(bpf_token_cmd, token, cmd);