Home
last modified time | relevance | path

Searched refs:files (Results 1 – 12 of 12) sorted by relevance

/security/loadpin/
DKconfig3 bool "Pin load of kernel files (modules, fw, etc) to one filesystem"
6 Any files read through the kernel file reading interface
9 enabled, any files that come from other filesystems will be
/security/apparmor/include/
Dapparmorfs.h35 struct aa_sfs_entry *files; member
58 { .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) }
Dfile.h202 void aa_inherit_files(const struct cred *cred, struct files_struct *files);
/security/apparmor/
D.gitignore2 # Generated include files
DMakefile11 clean-files := capability_names.h rlim_names.h net_names.h
Dfile.c679 void aa_inherit_files(const struct cred *cred, struct files_struct *files) in aa_inherit_files() argument
688 n = iterate_fd(files, 0, match_file, label); in aa_inherit_files()
698 } while ((n = iterate_fd(files, n, match_file, label)) != 0); in aa_inherit_files()
Dapparmorfs.c138 static struct tree_descr files[] = { {""} }; in apparmorfs_fill_super() local
141 error = simple_fill_super(sb, AAFS_MAGIC, files); in apparmorfs_fill_super()
2346 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_create_dir()
2384 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_remove_dir()
Dlsm.c689 aa_inherit_files(bprm->cred, current->files); in apparmor_bprm_committing_creds()
/security/
Dinode.c42 static const struct tree_descr files[] = {{""}}; in securityfs_fill_super() local
45 error = simple_fill_super(sb, SECURITYFS_MAGIC, files); in securityfs_fill_super()
/security/integrity/ima/
DKconfig20 values of executables and other sensitive system files,
28 whether or not critical system files have been modified.
182 to be signed. Unsigned files might prevent the system from
244 Adds support for signatures appended to files. The format of the
/security/selinux/
Dselinuxfs.c1601 static const struct tree_descr files[] = { in sel_make_avc_files() local
1610 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_avc_files()
1614 dentry = d_alloc_name(dir, files[i].name); in sel_make_avc_files()
1618 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_avc_files()
1624 inode->i_fop = files[i].ops; in sel_make_avc_files()
1637 static struct tree_descr files[] = { in sel_make_ss_files() local
1641 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_ss_files()
1645 dentry = d_alloc_name(dir, files[i].name); in sel_make_ss_files()
1649 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_ss_files()
1655 inode->i_fop = files[i].ops; in sel_make_ss_files()
Dhooks.c2456 struct files_struct *files) in flush_unauthorized_files() argument
2488 n = iterate_fd(files, 0, match_file, cred); in flush_unauthorized_files()
2498 } while ((n = iterate_fd(files, n, match_file, cred)) != 0); in flush_unauthorized_files()
2517 flush_unauthorized_files(bprm->cred, current->files); in selinux_bprm_committing_creds()