Searched refs:contents (Results 1 – 6 of 6) sorted by relevance
/security/loadpin/ |
D | loadpin.c | 181 bool contents) in loadpin_read_file() argument 191 static int loadpin_load_data(enum kernel_load_data_id id, bool contents) in loadpin_load_data() argument
|
/security/integrity/ima/ |
D | ima_main.c | 706 bool contents) in ima_read_file() argument 724 if (contents) in ima_read_file() 789 int ima_load_data(enum kernel_load_data_id id, bool contents) in ima_load_data() argument 810 if (ima_enforce && (ima_appraise & IMA_APPRAISE_FIRMWARE) && !contents) { in ima_load_data()
|
D | Kconfig | 21 to change the contents of an important system file
|
/security/ |
D | Kconfig.hardening | 163 the lifetime of any sensitive stack contents and reduces 235 cold boot memory attacks unable to recover freed memory contents. 252 contents. This helps ensure that temporary values are not 254 contents are less likely to be available for side channels
|
D | security.c | 1770 bool contents) in security_kernel_read_file() argument 1774 ret = call_int_hook(kernel_read_file, 0, file, id, contents); in security_kernel_read_file() 1777 return ima_read_file(file, id, contents); in security_kernel_read_file() 1793 int security_kernel_load_data(enum kernel_load_data_id id, bool contents) in security_kernel_load_data() argument 1797 ret = call_int_hook(kernel_load_data, 0, id, contents); in security_kernel_load_data() 1800 return ima_load_data(id, contents); in security_kernel_load_data()
|
/security/selinux/ |
D | hooks.c | 4208 bool contents) in selinux_kernel_read_file() argument 4214 rc = selinux_kernel_module_from_file(contents ? file : NULL); in selinux_kernel_read_file() 4223 static int selinux_kernel_load_data(enum kernel_load_data_id id, bool contents) in selinux_kernel_load_data() argument
|