| /security/integrity/ima/ |
| A D | ima_main.c | 479 struct lsm_prop prop; in ima_file_mmap() local 485 security_current_getlsmprop_subj(&prop); in ima_file_mmap() 524 struct lsm_prop prop; in ima_file_mprotect() local 534 security_current_getlsmprop_subj(&prop); in ima_file_mprotect() 540 current_cred(), &prop, MAY_EXEC, in ima_file_mprotect() 577 struct lsm_prop prop; in ima_bprm_check() local 630 struct lsm_prop prop; in ima_file_check() local 832 struct lsm_prop prop; in ima_read_file() local 882 struct lsm_prop prop; in ima_post_read_file() local 1031 struct lsm_prop prop; in process_buffer_measurement() local [all …]
|
| A D | ima.h | 383 const struct cred *cred, struct lsm_prop *prop, int mask, 414 const struct cred *cred, struct lsm_prop *prop, 569 static inline int ima_filter_rule_match(struct lsm_prop *prop, u32 field, u32 op, in ima_filter_rule_match() argument
|
| A D | ima_api.c | 190 const struct cred *cred, struct lsm_prop *prop, int mask, in ima_get_action() argument 199 return ima_match_policy(idmap, inode, cred, prop, func, mask, in ima_get_action()
|
| A D | ima_appraise.c | 77 struct lsm_prop prop; in ima_must_appraise() local 82 security_current_getlsmprop_subj(&prop); in ima_must_appraise() 83 return ima_match_policy(idmap, inode, current_cred(), &prop, in ima_must_appraise()
|
| A D | ima_policy.c | 571 struct lsm_prop *prop, enum ima_hooks func, int mask, in ima_match_rules() argument 662 rc = ima_filter_rule_match(prop, lsm_rule->lsm[i].type, in ima_match_rules() 742 const struct cred *cred, struct lsm_prop *prop, in ima_match_policy() argument 761 if (!ima_match_rules(entry, idmap, inode, cred, prop, in ima_match_policy()
|
| /security/apparmor/ |
| A D | secid.c | 87 int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp) in apparmor_lsmprop_to_secctx() argument 91 label = prop->apparmor.label; in apparmor_lsmprop_to_secctx()
|
| A D | audit.c | 267 int aa_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 273 label = prop->apparmor.label; in aa_audit_rule_match()
|
| A D | lsm.c | 991 static void apparmor_current_getlsmprop_subj(struct lsm_prop *prop) in apparmor_current_getlsmprop_subj() argument 997 prop->apparmor.label = label; in apparmor_current_getlsmprop_subj() 1002 struct lsm_prop *prop) in apparmor_task_getlsmprop_obj() argument 1006 prop->apparmor.label = label; in apparmor_task_getlsmprop_obj()
|
| /security/ipe/ |
| A D | eval.c | 320 struct ipe_prop *prop = NULL; in ipe_evaluate_event() local 350 list_for_each_entry(prop, &rule->props, next) { in ipe_evaluate_event() 351 match = evaluate_property(ctx, prop); in ipe_evaluate_event()
|
| /security/selinux/include/ |
| A D | audit.h | 52 int selinux_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op,
|
| /security/apparmor/include/ |
| A D | secid.h | 29 int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp);
|
| A D | audit.h | 208 int aa_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule);
|
| /security/ |
| A D | security.c | 2771 call_void_hook(inode_getlsmprop, inode, prop); in security_inode_getlsmprop() 3319 lsmprop_init(prop); in security_cred_getlsmprop() 3320 call_void_hook(cred_getlsmprop, c, prop); in security_cred_getlsmprop() 3549 void security_current_getlsmprop_subj(struct lsm_prop *prop) in security_current_getlsmprop_subj() argument 3551 lsmprop_init(prop); in security_current_getlsmprop_subj() 3552 call_void_hook(current_getlsmprop_subj, prop); in security_current_getlsmprop_subj() 3566 lsmprop_init(prop); in security_task_getlsmprop_obj() 3567 call_void_hook(task_getlsmprop_obj, p, prop); in security_task_getlsmprop_obj() 3790 lsmprop_init(prop); in security_ipc_getlsmprop() 3791 call_void_hook(ipc_getlsmprop, ipcp, prop); in security_ipc_getlsmprop() [all …]
|
| /security/smack/ |
| A D | smack_lsm.c | 1641 prop->smack.skp = smk_of_inode(inode); in smack_inode_getlsmprop() 2140 struct lsm_prop *prop) in smack_cred_getlsmprop() argument 2143 prop->smack.skp = smk_of_task(smack_cred(cred)); in smack_cred_getlsmprop() 2243 static void smack_current_getlsmprop_subj(struct lsm_prop *prop) in smack_current_getlsmprop_subj() argument 2245 prop->smack.skp = smk_of_current(); in smack_current_getlsmprop_subj() 2256 struct lsm_prop *prop) in smack_task_getlsmprop_obj() argument 2258 prop->smack.skp = smk_of_task_struct_obj(p); in smack_task_getlsmprop_obj() 3447 prop->smack.skp = *iskpp; in smack_ipc_getlsmprop() 4742 struct smack_known *skp = prop->smack.skp; in smack_audit_rule_match() 4820 static int smack_lsmprop_to_secctx(struct lsm_prop *prop, in smack_lsmprop_to_secctx() argument [all …]
|
| A D | smackfs.c | 189 nap->prop.smack.skp = smk_of_current(); in smk_netlabel_audit_set()
|
| /security/selinux/ |
| A D | hooks.c | 3652 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop() 3657 struct lsm_prop prop; in selinux_inode_copy_up() local 3669 selinux_inode_getlsmprop(d_inode(src), &prop); in selinux_inode_copy_up() 3670 tsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up() 4185 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop() 4363 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj() 4367 struct lsm_prop *prop) in selinux_task_getlsmprop_obj() argument 4369 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj() 6510 struct lsm_prop *prop) in selinux_ipc_getlsmprop() argument 6513 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop() [all …]
|
| /security/selinux/ss/ |
| A D | services.c | 3709 int selinux_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3735 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match() 3738 prop->selinux.secid); in selinux_audit_rule_match()
|
| A D | policydb.c | 1501 u32 prop = le32_to_cpu(buf[2]); in type_read() local 1503 if (prop & TYPEDATUM_PROPERTY_PRIMARY) in type_read() 1505 if (prop & TYPEDATUM_PROPERTY_ATTRIBUTE) in type_read()
|