Searched refs:func (Results 1 – 9 of 9) sorted by relevance
| /security/integrity/ima/ |
| A D | ima_policy.c | 102 enum ima_hooks func; member 525 switch (rule->func) { in ima_match_rule_data() 580 (rule->func != func && func != POST_SETATTR)) in ima_match_rules() 583 switch (func) { in ima_match_rules() 586 return ((rule->func == func) && in ima_match_rules() 702 switch (func) { in get_subaction() 1500 if (entry->func) in ima_parse_rule() 1980 #define __ima_hook_stringify(func, str) (#func), argument 2041 if (func > 0 && func < MAX_CHECK) in policy_func_show() 2293 enum ima_hooks func; in ima_appraise_signature() local [all …]
|
| A D | ima_appraise.c | 75 int mask, enum ima_hooks func) in ima_must_appraise() argument 110 enum ima_hooks func) in ima_get_cache_status() argument 112 switch (func) { in ima_get_cache_status() 130 enum ima_hooks func, in ima_set_cache_status() argument 133 switch (func) { in ima_set_cache_status() 157 switch (func) { in ima_cache_flags() 350 func == KEXEC_KERNEL_CHECK) in xattr_verify() 426 func == KEXEC_KERNEL_CHECK) in modsig_verify() 477 if (func == BPRM_CHECK) { in is_bprm_creds_for_exec() 517 if (is_bprm_creds_for_exec(func, file)) in ima_appraise_measurement() [all …]
|
| A D | ima_main.c | 113 if ((func == MMAP_CHECK || func == MMAP_CHECK_REQPROT) && in mmap_violation_check() 266 violation_check = ((func == FILE_CHECK || func == MMAP_CHECK || in process_measurement() 267 func == MMAP_CHECK_REQPROT) && in process_measurement() 278 func = FILE_CHECK; in process_measurement() 831 enum ima_hooks func; in ima_read_file() local 854 MAY_READ, func); in ima_read_file() 881 enum ima_hooks func; in ima_post_read_file() local 897 MAY_READ, func); in ima_post_read_file() 1053 if (func) { in process_buffer_measurement() 1056 &prop, 0, func, &pcr, &template, in process_buffer_measurement() [all …]
|
| A D | ima.h | 345 static inline const char *func_measure_str(enum ima_hooks func) in func_measure_str() argument 347 if (func >= MAX_CHECK) in func_measure_str() 350 return ima_hooks_measure_str[func]; in func_measure_str() 384 enum ima_hooks func, int *pcr, 398 const char *eventname, enum ima_hooks func, 415 enum ima_hooks func, int mask, int flags, int *pcr, 446 int mask, enum ima_hooks func); 449 enum ima_hooks func); 463 static inline int ima_appraise_measurement(enum ima_hooks func, in ima_appraise_measurement() argument 476 enum ima_hooks func) in ima_must_appraise() argument [all …]
|
| A D | ima_modsig.c | 40 int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, in ima_read_modsig() argument 60 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig()
|
| A D | ima_api.c | 191 enum ima_hooks func, int *pcr, in ima_get_action() argument 199 return ima_match_policy(idmap, inode, cred, prop, func, mask, in ima_get_action()
|
| /security/smack/ |
| A D | smack.h | 453 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument 459 a->a.smack_audit_data->function = func; in smk_ad_init() 462 static inline void smk_ad_init_net(struct smk_audit_info *a, const char *func, in smk_ad_init_net() argument 465 smk_ad_init(a, func, type); in smk_ad_init_net() 498 static inline void smk_ad_init(struct smk_audit_info *a, const char *func, in smk_ad_init() argument
|
| A D | smack_lsm.c | 414 unsigned int mode, const char *func) in smk_ptrace_rule_check() argument 423 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check()
|
| /security/keys/trusted-keys/ |
| A D | trusted_tee.c | 80 inv_arg.func = TA_CMD_SEAL; in trusted_tee_seal() 127 inv_arg.func = TA_CMD_UNSEAL; in trusted_tee_unseal() 173 inv_arg.func = TA_CMD_GET_RANDOM; in trusted_tee_get_random()
|
Completed in 36 milliseconds