Home
last modified time | relevance | path

Searched refs:prop (Results 1 – 18 of 18) sorted by relevance

/security/integrity/ima/
A Dima_main.c479 struct lsm_prop prop; in ima_file_mmap() local
485 security_current_getlsmprop_subj(&prop); in ima_file_mmap()
524 struct lsm_prop prop; in ima_file_mprotect() local
534 security_current_getlsmprop_subj(&prop); in ima_file_mprotect()
540 current_cred(), &prop, MAY_EXEC, in ima_file_mprotect()
577 struct lsm_prop prop; in ima_bprm_check() local
630 struct lsm_prop prop; in ima_file_check() local
832 struct lsm_prop prop; in ima_read_file() local
882 struct lsm_prop prop; in ima_post_read_file() local
1031 struct lsm_prop prop; in process_buffer_measurement() local
[all …]
A Dima.h383 const struct cred *cred, struct lsm_prop *prop, int mask,
414 const struct cred *cred, struct lsm_prop *prop,
569 static inline int ima_filter_rule_match(struct lsm_prop *prop, u32 field, u32 op, in ima_filter_rule_match() argument
A Dima_api.c190 const struct cred *cred, struct lsm_prop *prop, int mask, in ima_get_action() argument
199 return ima_match_policy(idmap, inode, cred, prop, func, mask, in ima_get_action()
A Dima_appraise.c77 struct lsm_prop prop; in ima_must_appraise() local
82 security_current_getlsmprop_subj(&prop); in ima_must_appraise()
83 return ima_match_policy(idmap, inode, current_cred(), &prop, in ima_must_appraise()
A Dima_policy.c571 struct lsm_prop *prop, enum ima_hooks func, int mask, in ima_match_rules() argument
662 rc = ima_filter_rule_match(prop, lsm_rule->lsm[i].type, in ima_match_rules()
742 const struct cred *cred, struct lsm_prop *prop, in ima_match_policy() argument
761 if (!ima_match_rules(entry, idmap, inode, cred, prop, in ima_match_policy()
/security/apparmor/
A Dsecid.c87 int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp) in apparmor_lsmprop_to_secctx() argument
91 label = prop->apparmor.label; in apparmor_lsmprop_to_secctx()
A Daudit.c267 int aa_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument
273 label = prop->apparmor.label; in aa_audit_rule_match()
A Dlsm.c991 static void apparmor_current_getlsmprop_subj(struct lsm_prop *prop) in apparmor_current_getlsmprop_subj() argument
997 prop->apparmor.label = label; in apparmor_current_getlsmprop_subj()
1002 struct lsm_prop *prop) in apparmor_task_getlsmprop_obj() argument
1006 prop->apparmor.label = label; in apparmor_task_getlsmprop_obj()
/security/ipe/
A Deval.c320 struct ipe_prop *prop = NULL; in ipe_evaluate_event() local
350 list_for_each_entry(prop, &rule->props, next) { in ipe_evaluate_event()
351 match = evaluate_property(ctx, prop); in ipe_evaluate_event()
/security/selinux/include/
A Daudit.h52 int selinux_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op,
/security/apparmor/include/
A Dsecid.h29 int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp);
A Daudit.h208 int aa_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule);
/security/
A Dsecurity.c2771 call_void_hook(inode_getlsmprop, inode, prop); in security_inode_getlsmprop()
3319 lsmprop_init(prop); in security_cred_getlsmprop()
3320 call_void_hook(cred_getlsmprop, c, prop); in security_cred_getlsmprop()
3549 void security_current_getlsmprop_subj(struct lsm_prop *prop) in security_current_getlsmprop_subj() argument
3551 lsmprop_init(prop); in security_current_getlsmprop_subj()
3552 call_void_hook(current_getlsmprop_subj, prop); in security_current_getlsmprop_subj()
3566 lsmprop_init(prop); in security_task_getlsmprop_obj()
3567 call_void_hook(task_getlsmprop_obj, p, prop); in security_task_getlsmprop_obj()
3790 lsmprop_init(prop); in security_ipc_getlsmprop()
3791 call_void_hook(ipc_getlsmprop, ipcp, prop); in security_ipc_getlsmprop()
[all …]
/security/smack/
A Dsmack_lsm.c1641 prop->smack.skp = smk_of_inode(inode); in smack_inode_getlsmprop()
2140 struct lsm_prop *prop) in smack_cred_getlsmprop() argument
2143 prop->smack.skp = smk_of_task(smack_cred(cred)); in smack_cred_getlsmprop()
2243 static void smack_current_getlsmprop_subj(struct lsm_prop *prop) in smack_current_getlsmprop_subj() argument
2245 prop->smack.skp = smk_of_current(); in smack_current_getlsmprop_subj()
2256 struct lsm_prop *prop) in smack_task_getlsmprop_obj() argument
2258 prop->smack.skp = smk_of_task_struct_obj(p); in smack_task_getlsmprop_obj()
3447 prop->smack.skp = *iskpp; in smack_ipc_getlsmprop()
4742 struct smack_known *skp = prop->smack.skp; in smack_audit_rule_match()
4820 static int smack_lsmprop_to_secctx(struct lsm_prop *prop, in smack_lsmprop_to_secctx() argument
[all …]
A Dsmackfs.c189 nap->prop.smack.skp = smk_of_current(); in smk_netlabel_audit_set()
/security/selinux/
A Dhooks.c3652 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop()
3657 struct lsm_prop prop; in selinux_inode_copy_up() local
3669 selinux_inode_getlsmprop(d_inode(src), &prop); in selinux_inode_copy_up()
3670 tsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up()
4185 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop()
4363 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj()
4367 struct lsm_prop *prop) in selinux_task_getlsmprop_obj() argument
4369 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj()
6510 struct lsm_prop *prop) in selinux_ipc_getlsmprop() argument
6513 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop()
[all …]
/security/selinux/ss/
A Dservices.c3709 int selinux_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3735 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match()
3738 prop->selinux.secid); in selinux_audit_rule_match()
A Dpolicydb.c1501 u32 prop = le32_to_cpu(buf[2]); in type_read() local
1503 if (prop & TYPEDATUM_PROPERTY_PRIMARY) in type_read()
1505 if (prop & TYPEDATUM_PROPERTY_ATTRIBUTE) in type_read()

Completed in 67 milliseconds