Searched refs:pathname (Results 1 – 9 of 9) sorted by relevance
/security/loadpin/ |
D | loadpin.c | 24 char *cmdline, *pathname; in report_load() local 26 pathname = kstrdup_quotable_file(file, GFP_KERNEL); in report_load() 31 (pathname && pathname[0] != '<') ? "\"" : "", in report_load() 32 pathname, in report_load() 33 (pathname && pathname[0] != '<') ? "\"" : "", in report_load() 38 kfree(pathname); in report_load()
|
/security/integrity/ima/ |
D | ima_main.c | 87 char **pathbuf, const char **pathname, in mmap_violation_check() argument 98 *pathname = ima_d_path(&file->f_path, pathbuf, in mmap_violation_check() 100 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, *pathname, in mmap_violation_check() 120 const char **pathname, in ima_rdwr_violation_check() argument 146 *pathname = ima_d_path(&file->f_path, pathbuf, filename); in ima_rdwr_violation_check() 149 ima_add_violation(file, *pathname, iint, in ima_rdwr_violation_check() 152 ima_add_violation(file, *pathname, iint, in ima_rdwr_violation_check() 211 const char *pathname = NULL; in process_measurement() local 252 &pathbuf, &pathname, filename); in process_measurement() 323 &pathname, filename); in process_measurement() [all …]
|
D | ima_api.c | 398 char *pathname = NULL; in ima_d_path() local 402 pathname = d_absolute_path(path, *pathbuf, PATH_MAX); in ima_d_path() 403 if (IS_ERR(pathname)) { in ima_d_path() 406 pathname = NULL; in ima_d_path() 410 if (!pathname) { in ima_d_path() 412 pathname = namebuf; in ima_d_path() 415 return pathname; in ima_d_path()
|
D | Kconfig | 69 hash, defined as 20 bytes, and a null terminated pathname,
|
/security/tomoyo/ |
D | realpath.c | 304 char *tomoyo_realpath_nofollow(const char *pathname) in tomoyo_realpath_nofollow() argument 308 if (pathname && kern_path(pathname, 0, &path) == 0) { in tomoyo_realpath_nofollow()
|
D | Kconfig | 13 This selects TOMOYO Linux, pathname-based access control. 64 This is the default pathname of policy loader which is called before 74 This is the default pathname of activation trigger.
|
D | group.c | 131 tomoyo_path_matches_group(const struct tomoyo_path_info *pathname, in tomoyo_path_matches_group() argument 140 if (!tomoyo_path_matches_pattern(pathname, member->member_name)) in tomoyo_path_matches_group()
|
D | common.h | 960 char *tomoyo_realpath_nofollow(const char *pathname); 969 (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group);
|
/security/ |
D | Kconfig | 80 bool "Security hooks for pathname based access control" 83 This enables the security hooks for pathname based access control. 85 implement pathname based access controls.
|