Home
last modified time | relevance | path

Searched refs:files (Results 1 – 12 of 12) sorted by relevance

/security/loadpin/
DKconfig3 bool "Pin load of kernel files (modules, fw, etc) to one filesystem"
6 Any files read through the kernel file reading interface
9 enabled, any files that come from other filesystems will be
/security/apparmor/include/
Dapparmorfs.h35 struct aa_sfs_entry *files; member
58 { .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) }
Dfile.h202 void aa_inherit_files(const struct cred *cred, struct files_struct *files);
/security/apparmor/
D.gitignore2 # Generated include files
DMakefile11 clean-files := capability_names.h rlim_names.h net_names.h
Dfile.c679 void aa_inherit_files(const struct cred *cred, struct files_struct *files) in aa_inherit_files() argument
688 n = iterate_fd(files, 0, match_file, label); in aa_inherit_files()
698 } while ((n = iterate_fd(files, n, match_file, label)) != 0); in aa_inherit_files()
Dapparmorfs.c138 static struct tree_descr files[] = { {""} }; in apparmorfs_fill_super() local
141 error = simple_fill_super(sb, AAFS_MAGIC, files); in apparmorfs_fill_super()
2346 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_create_dir()
2384 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_remove_dir()
Dlsm.c689 aa_inherit_files(bprm->cred, current->files); in apparmor_bprm_committing_creds()
/security/
Dinode.c42 static const struct tree_descr files[] = {{""}}; in securityfs_fill_super() local
45 error = simple_fill_super(sb, SECURITYFS_MAGIC, files); in securityfs_fill_super()
/security/integrity/ima/
DKconfig19 values of executables and other sensitive system files,
27 whether or not critical system files have been modified.
173 to be signed. Unsigned files might prevent the system from
235 Adds support for signatures appended to files. The format of the
/security/selinux/
Dselinuxfs.c1602 static const struct tree_descr files[] = { in sel_make_avc_files() local
1611 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_avc_files()
1615 dentry = d_alloc_name(dir, files[i].name); in sel_make_avc_files()
1619 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_avc_files()
1625 inode->i_fop = files[i].ops; in sel_make_avc_files()
1638 static struct tree_descr files[] = { in sel_make_ss_files() local
1642 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_ss_files()
1646 dentry = d_alloc_name(dir, files[i].name); in sel_make_ss_files()
1650 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_ss_files()
1656 inode->i_fop = files[i].ops; in sel_make_ss_files()
Dhooks.c2467 struct files_struct *files) in flush_unauthorized_files() argument
2499 n = iterate_fd(files, 0, match_file, cred); in flush_unauthorized_files()
2509 } while ((n = iterate_fd(files, n, match_file, cred)) != 0); in flush_unauthorized_files()
2528 flush_unauthorized_files(bprm->cred, current->files); in selinux_bprm_committing_creds()