Home
last modified time | relevance | path

Searched refs:pathname (Results 1 – 9 of 9) sorted by relevance

/security/loadpin/
Dloadpin.c24 char *cmdline, *pathname; in report_load() local
26 pathname = kstrdup_quotable_file(file, GFP_KERNEL); in report_load()
31 (pathname && pathname[0] != '<') ? "\"" : "", in report_load()
32 pathname, in report_load()
33 (pathname && pathname[0] != '<') ? "\"" : "", in report_load()
38 kfree(pathname); in report_load()
/security/integrity/ima/
Dima_main.c87 char **pathbuf, const char **pathname, in mmap_violation_check() argument
98 *pathname = ima_d_path(&file->f_path, pathbuf, in mmap_violation_check()
100 integrity_audit_msg(AUDIT_INTEGRITY_DATA, inode, *pathname, in mmap_violation_check()
120 const char **pathname, in ima_rdwr_violation_check() argument
146 *pathname = ima_d_path(&file->f_path, pathbuf, filename); in ima_rdwr_violation_check()
149 ima_add_violation(file, *pathname, iint, in ima_rdwr_violation_check()
152 ima_add_violation(file, *pathname, iint, in ima_rdwr_violation_check()
211 const char *pathname = NULL; in process_measurement() local
252 &pathbuf, &pathname, filename); in process_measurement()
323 &pathname, filename); in process_measurement()
[all …]
Dima_api.c398 char *pathname = NULL; in ima_d_path() local
402 pathname = d_absolute_path(path, *pathbuf, PATH_MAX); in ima_d_path()
403 if (IS_ERR(pathname)) { in ima_d_path()
406 pathname = NULL; in ima_d_path()
410 if (!pathname) { in ima_d_path()
412 pathname = namebuf; in ima_d_path()
415 return pathname; in ima_d_path()
DKconfig69 hash, defined as 20 bytes, and a null terminated pathname,
/security/tomoyo/
Drealpath.c304 char *tomoyo_realpath_nofollow(const char *pathname) in tomoyo_realpath_nofollow() argument
308 if (pathname && kern_path(pathname, 0, &path) == 0) { in tomoyo_realpath_nofollow()
DKconfig13 This selects TOMOYO Linux, pathname-based access control.
64 This is the default pathname of policy loader which is called before
74 This is the default pathname of activation trigger.
Dgroup.c131 tomoyo_path_matches_group(const struct tomoyo_path_info *pathname, in tomoyo_path_matches_group() argument
140 if (!tomoyo_path_matches_pattern(pathname, member->member_name)) in tomoyo_path_matches_group()
Dcommon.h960 char *tomoyo_realpath_nofollow(const char *pathname);
969 (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group);
/security/
DKconfig80 bool "Security hooks for pathname based access control"
83 This enables the security hooks for pathname based access control.
85 implement pathname based access controls.