| /security/ipe/ |
| A D | policy_fs.c | 54 root = d_inode(f->f_path.dentry->d_parent); in read_pkcs7() 97 root = d_inode(f->f_path.dentry->d_parent); in read_policy() 134 root = d_inode(f->f_path.dentry->d_parent); in read_name() 174 root = d_inode(f->f_path.dentry->d_parent); in read_version() 226 root = d_inode(f->f_path.dentry->d_parent); in setactive() 264 root = d_inode(f->f_path.dentry->d_parent); in getactive() 317 root = d_inode(f->f_path.dentry->d_parent); in update_policy() 454 const struct ipefs_file *f = NULL; in ipe_new_policyfs_node() local 471 f = &policy_subdir[i]; in ipe_new_policyfs_node() 473 d = securityfs_create_file(f->name, f->access, policyfs, in ipe_new_policyfs_node() [all …]
|
| A D | fs.c | 29 static ssize_t setaudit(struct file *f, const char __user *data, in setaudit() argument 35 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setaudit() 56 static ssize_t getaudit(struct file *f, char __user *data, in getaudit() argument 77 static ssize_t setenforce(struct file *f, const char __user *data, in setenforce() argument 83 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setenforce() 108 static ssize_t getenforce(struct file *f, char __user *data, in getenforce() argument 136 static ssize_t new_policy(struct file *f, const char __user *data, in new_policy() argument 143 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) { in new_policy()
|
| A D | hooks.c | 53 int ipe_mmap_file(struct file *f, unsigned long reqprot __always_unused, in ipe_mmap_file() argument 59 ipe_build_eval_ctx(&ctx, f, IPE_OP_EXEC, IPE_HOOK_MMAP); in ipe_mmap_file()
|
| A D | hooks.h | 27 int ipe_mmap_file(struct file *f, unsigned long reqprot, unsigned long prot,
|
| A D | eval.c | 26 #define FILE_SUPERBLOCK(f) ((f)->f_path.mnt->mnt_sb) argument
|
| /security/tomoyo/ |
| A D | util.c | 859 while (*f && *p) { in tomoyo_path_matches_pattern2() 862 f_delimiter = f + strlen(f); in tomoyo_path_matches_pattern2() 871 f = f_delimiter; in tomoyo_path_matches_pattern2() 872 if (*f) in tomoyo_path_matches_pattern2() 873 f++; in tomoyo_path_matches_pattern2() 882 return !*f && !*p; in tomoyo_path_matches_pattern2() 899 f = f_delimiter; in tomoyo_path_matches_pattern2() 900 if (!*f) in tomoyo_path_matches_pattern2() 902 f++; in tomoyo_path_matches_pattern2() 951 if (strncmp(f, p, len)) in tomoyo_path_matches_pattern() [all …]
|
| A D | tomoyo.c | 328 static int tomoyo_file_open(struct file *f) in tomoyo_file_open() argument 332 if (f->f_flags & __FMODE_EXEC) in tomoyo_file_open() 334 return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, in tomoyo_file_open() 335 f->f_flags); in tomoyo_file_open()
|
| /security/landlock/ |
| A D | syscalls.c | 291 CLASS(fd_raw, f)(fd); in get_path_from_fd() 296 if (fd_empty(f)) in get_path_from_fd() 303 if ((fd_file(f)->f_op == &ruleset_fops) || in get_path_from_fd() 304 (fd_file(f)->f_path.mnt->mnt_flags & MNT_INTERNAL) || in get_path_from_fd() 305 (fd_file(f)->f_path.dentry->d_sb->s_flags & SB_NOUSER) || in get_path_from_fd() 306 IS_PRIVATE(d_backing_inode(fd_file(f)->f_path.dentry))) in get_path_from_fd() 309 *path = fd_file(f)->f_path; in get_path_from_fd()
|
| /security/integrity/ima/ |
| A D | ima_crypto.c | 535 struct file *f = file; in ima_calc_file_hash() local 553 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash() 554 if (IS_ERR(f)) in ima_calc_file_hash() 555 return PTR_ERR(f); in ima_calc_file_hash() 560 i_size = i_size_read(file_inode(f)); in ima_calc_file_hash() 563 rc = ima_calc_file_ahash(f, hash); in ima_calc_file_hash() 568 rc = ima_calc_file_shash(f, hash); in ima_calc_file_hash() 571 fput(f); in ima_calc_file_hash()
|
| A D | ima_main.c | 1129 CLASS(fd, f)(kernel_fd); in ima_kexec_cmdline() 1130 if (fd_empty(f)) in ima_kexec_cmdline() 1133 process_buffer_measurement(file_mnt_idmap(fd_file(f)), file_inode(fd_file(f)), in ima_kexec_cmdline()
|
| /security/loadpin/ |
| A D | loadpin.c | 297 CLASS(fd, f)(fd); in read_trusted_verity_root_digests() 298 if (fd_empty(f)) in read_trusted_verity_root_digests() 307 rc = kernel_read_file(fd_file(f), 0, (void **)&data, SZ_4K - 1, NULL, READING_POLICY); in read_trusted_verity_root_digests()
|
| /security/apparmor/ |
| A D | audit.c | 256 struct audit_field *f = &rule->fields[i]; in aa_audit_rule_known() local 258 switch (f->type) { in aa_audit_rule_known()
|
| A D | apparmorfs.c | 446 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_load() 463 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_replace() 483 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_remove() 2215 static void *p_start(struct seq_file *f, loff_t *pos) in p_start() argument 2220 f->private = root; in p_start() 2246 struct aa_ns *ns = f->private; in p_next() 2259 static void p_stop(struct seq_file *f, void *p) in p_stop() argument 2262 struct aa_ns *root = f->private, *ns; in p_stop() 2282 struct aa_ns *root = f->private; in seq_show_profile() 2284 aa_label_seq_xprint(f, root, &profile->label, in seq_show_profile() [all …]
|
| A D | label.c | 1755 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns, in aa_label_seq_xprint() argument 1758 AA_BUG(!f); in aa_label_seq_xprint() 1770 seq_puts(f, str); in aa_label_seq_xprint() 1773 seq_printf(f, "%s (%s)", label->hname, in aa_label_seq_xprint() 1776 seq_puts(f, label->hname); in aa_label_seq_xprint()
|
| /security/apparmor/include/ |
| A D | label.h | 305 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns,
|
| /security/smack/ |
| A D | smack_lsm.c | 4716 struct audit_field *f; in smack_audit_rule_known() local 4720 f = &krule->fields[i]; in smack_audit_rule_known() 4722 if (f->type == AUDIT_SUBJ_USER || f->type == AUDIT_OBJ_USER) in smack_audit_rule_known()
|
| /security/selinux/ss/ |
| A D | services.c | 3690 struct audit_field *f = &rule->fields[i]; in selinux_audit_rule_known() local 3691 switch (f->type) { in selinux_audit_rule_known()
|