/security/tomoyo/ |
D | util.c | 849 static bool tomoyo_path_matches_pattern2(const char *f, const char *p) in tomoyo_path_matches_pattern2() argument 854 while (*f && *p) { in tomoyo_path_matches_pattern2() 855 f_delimiter = strchr(f, '/'); in tomoyo_path_matches_pattern2() 857 f_delimiter = f + strlen(f); in tomoyo_path_matches_pattern2() 863 if (!tomoyo_file_matches_pattern(f, f_delimiter, p, in tomoyo_path_matches_pattern2() 866 f = f_delimiter; in tomoyo_path_matches_pattern2() 867 if (*f) in tomoyo_path_matches_pattern2() 868 f++; in tomoyo_path_matches_pattern2() 877 return !*f && !*p; in tomoyo_path_matches_pattern2() 890 if (!tomoyo_file_matches_pattern(f, f_delimiter, p + 2, in tomoyo_path_matches_pattern2() [all …]
|
D | tomoyo.c | 308 static int tomoyo_file_open(struct file *f) in tomoyo_file_open() argument 313 return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, in tomoyo_file_open() 314 f->f_flags); in tomoyo_file_open()
|
/security/integrity/ima/ |
D | ima_crypto.c | 540 struct file *f = file; in ima_calc_file_hash() local 558 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash() 559 if (IS_ERR(f)) in ima_calc_file_hash() 560 return PTR_ERR(f); in ima_calc_file_hash() 565 i_size = i_size_read(file_inode(f)); in ima_calc_file_hash() 568 rc = ima_calc_file_ahash(f, hash); in ima_calc_file_hash() 573 rc = ima_calc_file_shash(f, hash); in ima_calc_file_hash() 576 fput(f); in ima_calc_file_hash()
|
D | ima_main.c | 907 struct fd f; in ima_kexec_cmdline() local 912 f = fdget(kernel_fd); in ima_kexec_cmdline() 913 if (!f.file) in ima_kexec_cmdline() 916 process_buffer_measurement(file_inode(f.file), buf, size, in ima_kexec_cmdline() 918 fdput(f); in ima_kexec_cmdline()
|
/security/apparmor/ |
D | audit.c | 212 struct audit_field *f = &rule->fields[i]; in aa_audit_rule_known() local 214 switch (f->type) { in aa_audit_rule_known()
|
D | apparmorfs.c | 440 static ssize_t profile_load(struct file *f, const char __user *buf, size_t size, in profile_load() argument 443 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_load() 457 static ssize_t profile_replace(struct file *f, const char __user *buf, in profile_replace() argument 460 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_replace() 474 static ssize_t profile_remove(struct file *f, const char __user *buf, in profile_remove() argument 480 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_remove() 2187 static void *p_start(struct seq_file *f, loff_t *pos) in p_start() argument 2192 f->private = root; in p_start() 2215 static void *p_next(struct seq_file *f, void *p, loff_t *pos) in p_next() argument 2218 struct aa_ns *ns = f->private; in p_next() [all …]
|
D | label.c | 1765 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns, in aa_label_seq_xprint() argument 1768 AA_BUG(!f); in aa_label_seq_xprint() 1780 seq_puts(f, str); in aa_label_seq_xprint() 1783 seq_printf(f, "%s (%s)", label->hname, in aa_label_seq_xprint() 1786 seq_puts(f, label->hname); in aa_label_seq_xprint() 1820 void aa_label_seq_print(struct seq_file *f, struct aa_label *label, gfp_t gfp) in aa_label_seq_print() argument 1824 aa_label_seq_xprint(f, ns, label, FLAG_VIEW_SUBNS, gfp); in aa_label_seq_print()
|
/security/apparmor/include/ |
D | label.h | 320 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns, 325 void aa_label_seq_print(struct seq_file *f, struct aa_label *label, gfp_t gfp);
|
/security/smack/ |
D | smack_lsm.c | 4519 struct audit_field *f; in smack_audit_rule_known() local 4523 f = &krule->fields[i]; in smack_audit_rule_known() 4525 if (f->type == AUDIT_SUBJ_USER || f->type == AUDIT_OBJ_USER) in smack_audit_rule_known()
|
/security/selinux/ss/ |
D | services.c | 3660 struct audit_field *f = &rule->fields[i]; in selinux_audit_rule_known() local 3661 switch (f->type) { in selinux_audit_rule_known()
|