Home
last modified time | relevance | path

Searched refs:func (Results 1 – 9 of 9) sorted by relevance

/security/integrity/ima/
A Dima_policy.c102 enum ima_hooks func; member
525 switch (rule->func) { in ima_match_rule_data()
580 (rule->func != func && func != POST_SETATTR)) in ima_match_rules()
583 switch (func) { in ima_match_rules()
586 return ((rule->func == func) && in ima_match_rules()
702 switch (func) { in get_subaction()
1500 if (entry->func) in ima_parse_rule()
1980 #define __ima_hook_stringify(func, str) (#func), argument
2041 if (func > 0 && func < MAX_CHECK) in policy_func_show()
2293 enum ima_hooks func; in ima_appraise_signature() local
[all …]
A Dima_appraise.c75 int mask, enum ima_hooks func) in ima_must_appraise() argument
110 enum ima_hooks func) in ima_get_cache_status() argument
112 switch (func) { in ima_get_cache_status()
130 enum ima_hooks func, in ima_set_cache_status() argument
133 switch (func) { in ima_set_cache_status()
157 switch (func) { in ima_cache_flags()
350 func == KEXEC_KERNEL_CHECK) in xattr_verify()
426 func == KEXEC_KERNEL_CHECK) in modsig_verify()
477 if (func == BPRM_CHECK) { in is_bprm_creds_for_exec()
517 if (is_bprm_creds_for_exec(func, file)) in ima_appraise_measurement()
[all …]
A Dima_main.c113 if ((func == MMAP_CHECK || func == MMAP_CHECK_REQPROT) && in mmap_violation_check()
266 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK || in process_measurement()
267 func == MMAP_CHECK_REQPROT) && in process_measurement()
278 func = FILE_CHECK; in process_measurement()
831 enum ima_hooks func; in ima_read_file() local
854 MAY_READ, func); in ima_read_file()
881 enum ima_hooks func; in ima_post_read_file() local
897 MAY_READ, func); in ima_post_read_file()
1053 if (func) { in process_buffer_measurement()
1056 &prop, 0, func, &pcr, &template, in process_buffer_measurement()
[all …]
A Dima.h345 static inline const char *func_measure_str(enum ima_hooks func) in func_measure_str() argument
347 if (func >= MAX_CHECK) in func_measure_str()
350 return ima_hooks_measure_str[func]; in func_measure_str()
384 enum ima_hooks func, int *pcr,
398 const char *eventname, enum ima_hooks func,
415 enum ima_hooks func, int mask, int flags, int *pcr,
446 int mask, enum ima_hooks func);
449 enum ima_hooks func);
463 static inline int ima_appraise_measurement(enum ima_hooks func, in ima_appraise_measurement() argument
476 enum ima_hooks func) in ima_must_appraise() argument
[all …]
A Dima_modsig.c40 int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, in ima_read_modsig() argument
60 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig()
A Dima_api.c191 enum ima_hooks func, int *pcr, in ima_get_action() argument
199 return ima_match_policy(idmap, inode, cred, prop, func, mask, in ima_get_action()
/security/smack/
A Dsmack.h453 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument
459 a->a.smack_audit_data->function = func; in smk_ad_init()
462 static inline void smk_ad_init_net(struct smk_audit_info *a, const char *func, in smk_ad_init_net() argument
465 smk_ad_init(a, func, type); in smk_ad_init_net()
498 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument
A Dsmack_lsm.c414 unsigned int mode, const char *func) in smk_ptrace_rule_check() argument
423 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check()
/security/keys/trusted-keys/
A Dtrusted_tee.c80 inv_arg.func = TA_CMD_SEAL; in trusted_tee_seal()
127 inv_arg.func = TA_CMD_UNSEAL; in trusted_tee_unseal()
173 inv_arg.func = TA_CMD_GET_RANDOM; in trusted_tee_get_random()

Completed in 36 milliseconds