Searched refs:files (Results 1 – 11 of 11) sorted by relevance
/security/loadpin/ |
D | Kconfig | 3 bool "Pin load of kernel files (modules, fw, etc) to one filesystem" 6 Any files read through the kernel file reading interface 9 enabled, any files that come from other filesystems will be
|
/security/apparmor/include/ |
D | apparmorfs.h | 35 struct aa_sfs_entry *files; member 58 { .name = (_name), .v_type = AA_SFS_TYPE_DIR, .v.files = (_value) }
|
D | file.h | 202 void aa_inherit_files(const struct cred *cred, struct files_struct *files);
|
/security/ |
D | inode.c | 42 static const struct tree_descr files[] = {{""}}; in securityfs_fill_super() local 45 error = simple_fill_super(sb, SECURITYFS_MAGIC, files); in securityfs_fill_super()
|
/security/apparmor/ |
D | Makefile | 11 clean-files := capability_names.h rlim_names.h net_names.h
|
D | file.c | 687 void aa_inherit_files(const struct cred *cred, struct files_struct *files) in aa_inherit_files() argument 696 n = iterate_fd(files, 0, match_file, label); in aa_inherit_files() 706 } while ((n = iterate_fd(files, n, match_file, label)) != 0); in aa_inherit_files()
|
D | apparmorfs.c | 168 static struct tree_descr files[] = { {""} }; in apparmorfs_fill_super() local 171 error = simple_fill_super(sb, AAFS_MAGIC, files); in apparmorfs_fill_super() 2435 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_create_dir() 2473 for (fs_file = fs_dir->v.files; fs_file && fs_file->name; ++fs_file) { in entry_remove_dir()
|
D | lsm.c | 711 aa_inherit_files(bprm->cred, current->files); in apparmor_bprm_committing_creds()
|
/security/integrity/ima/ |
D | Kconfig | 19 values of executables and other sensitive system files, 27 whether or not critical system files have been modified. 178 to be signed. Unsigned files might prevent the system from 240 Adds support for signatures appended to files. The format of the
|
/security/selinux/ |
D | selinuxfs.c | 1686 static const struct tree_descr files[] = { in sel_make_avc_files() local 1695 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_avc_files() 1699 dentry = d_alloc_name(dir, files[i].name); in sel_make_avc_files() 1703 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_avc_files() 1709 inode->i_fop = files[i].ops; in sel_make_avc_files() 1722 static struct tree_descr files[] = { in sel_make_ss_files() local 1726 for (i = 0; i < ARRAY_SIZE(files); i++) { in sel_make_ss_files() 1730 dentry = d_alloc_name(dir, files[i].name); in sel_make_ss_files() 1734 inode = sel_make_inode(dir->d_sb, S_IFREG|files[i].mode); in sel_make_ss_files() 1740 inode->i_fop = files[i].ops; in sel_make_ss_files()
|
D | hooks.c | 2472 struct files_struct *files) in flush_unauthorized_files() argument 2504 n = iterate_fd(files, 0, match_file, cred); in flush_unauthorized_files() 2514 } while ((n = iterate_fd(files, n, match_file, cred)) != 0); in flush_unauthorized_files() 2533 flush_unauthorized_files(bprm->cred, current->files); in selinux_bprm_committing_creds()
|