Searched refs:contents (Results 1 – 8 of 8) sorted by relevance
| /security/ipe/ |
| A D | hooks.h | 34 bool contents); 36 int ipe_kernel_load_data(enum kernel_load_data_id id, bool contents);
|
| A D | hooks.c | 111 bool contents) in ipe_kernel_read_file() argument 156 int ipe_kernel_load_data(enum kernel_load_data_id id, bool contents) in ipe_kernel_load_data() argument
|
| /security/loadpin/ |
| A D | loadpin.c | 191 bool contents) in loadpin_read_file() argument 201 static int loadpin_load_data(enum kernel_load_data_id id, bool contents) in loadpin_load_data() argument
|
| /security/integrity/ima/ |
| A D | ima_main.c | 829 bool contents) in ima_read_file() argument 847 if (contents) in ima_read_file() 912 static int ima_load_data(enum kernel_load_data_id id, bool contents) in ima_load_data() argument 933 if (ima_enforce && (ima_appraise & IMA_APPRAISE_FIRMWARE) && !contents) { in ima_load_data()
|
| A D | Kconfig | 22 to change the contents of an important system file
|
| /security/ |
| A D | Kconfig.hardening | 96 the lifetime of any sensitive stack contents and reduces 184 cold boot memory attacks unable to recover freed memory contents. 201 contents. This helps ensure that temporary values are not 203 contents are less likely to be available for side channels
|
| A D | security.c | 3380 bool contents) in security_kernel_read_file() argument 3382 return call_int_hook(kernel_read_file, file, id, contents); in security_kernel_read_file() 3415 int security_kernel_load_data(enum kernel_load_data_id id, bool contents) in security_kernel_load_data() argument 3417 return call_int_hook(kernel_load_data, id, contents); in security_kernel_load_data()
|
| /security/selinux/ |
| A D | hooks.c | 4270 bool contents) in selinux_kernel_read_file() argument 4306 static int selinux_kernel_load_data(enum kernel_load_data_id id, bool contents) in selinux_kernel_load_data() argument
|
Completed in 39 milliseconds