Home
last modified time | relevance | path

Searched refs:f (Results 1 – 17 of 17) sorted by relevance

/security/ipe/
A Dpolicy_fs.c54 root = d_inode(f->f_path.dentry->d_parent); in read_pkcs7()
97 root = d_inode(f->f_path.dentry->d_parent); in read_policy()
134 root = d_inode(f->f_path.dentry->d_parent); in read_name()
174 root = d_inode(f->f_path.dentry->d_parent); in read_version()
226 root = d_inode(f->f_path.dentry->d_parent); in setactive()
264 root = d_inode(f->f_path.dentry->d_parent); in getactive()
317 root = d_inode(f->f_path.dentry->d_parent); in update_policy()
454 const struct ipefs_file *f = NULL; in ipe_new_policyfs_node() local
471 f = &policy_subdir[i]; in ipe_new_policyfs_node()
473 d = securityfs_create_file(f->name, f->access, policyfs, in ipe_new_policyfs_node()
[all …]
A Dfs.c29 static ssize_t setaudit(struct file *f, const char __user *data, in setaudit() argument
35 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setaudit()
56 static ssize_t getaudit(struct file *f, char __user *data, in getaudit() argument
77 static ssize_t setenforce(struct file *f, const char __user *data, in setenforce() argument
83 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) in setenforce()
108 static ssize_t getenforce(struct file *f, char __user *data, in getenforce() argument
136 static ssize_t new_policy(struct file *f, const char __user *data, in new_policy() argument
143 if (!file_ns_capable(f, &init_user_ns, CAP_MAC_ADMIN)) { in new_policy()
A Dhooks.c53 int ipe_mmap_file(struct file *f, unsigned long reqprot __always_unused, in ipe_mmap_file() argument
59 ipe_build_eval_ctx(&ctx, f, IPE_OP_EXEC, IPE_HOOK_MMAP); in ipe_mmap_file()
A Dhooks.h27 int ipe_mmap_file(struct file *f, unsigned long reqprot, unsigned long prot,
A Deval.c26 #define FILE_SUPERBLOCK(f) ((f)->f_path.mnt->mnt_sb) argument
/security/tomoyo/
A Dutil.c859 while (*f && *p) { in tomoyo_path_matches_pattern2()
862 f_delimiter = f + strlen(f); in tomoyo_path_matches_pattern2()
871 f = f_delimiter; in tomoyo_path_matches_pattern2()
872 if (*f) in tomoyo_path_matches_pattern2()
873 f++; in tomoyo_path_matches_pattern2()
882 return !*f && !*p; in tomoyo_path_matches_pattern2()
899 f = f_delimiter; in tomoyo_path_matches_pattern2()
900 if (!*f) in tomoyo_path_matches_pattern2()
902 f++; in tomoyo_path_matches_pattern2()
951 if (strncmp(f, p, len)) in tomoyo_path_matches_pattern()
[all …]
A Dtomoyo.c328 static int tomoyo_file_open(struct file *f) in tomoyo_file_open() argument
332 if (f->f_flags & __FMODE_EXEC) in tomoyo_file_open()
334 return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, in tomoyo_file_open()
335 f->f_flags); in tomoyo_file_open()
/security/landlock/
A Dsyscalls.c291 CLASS(fd_raw, f)(fd); in get_path_from_fd()
296 if (fd_empty(f)) in get_path_from_fd()
303 if ((fd_file(f)->f_op == &ruleset_fops) || in get_path_from_fd()
304 (fd_file(f)->f_path.mnt->mnt_flags & MNT_INTERNAL) || in get_path_from_fd()
305 (fd_file(f)->f_path.dentry->d_sb->s_flags & SB_NOUSER) || in get_path_from_fd()
306 IS_PRIVATE(d_backing_inode(fd_file(f)->f_path.dentry))) in get_path_from_fd()
309 *path = fd_file(f)->f_path; in get_path_from_fd()
/security/integrity/ima/
A Dima_crypto.c535 struct file *f = file; in ima_calc_file_hash() local
553 f = dentry_open(&file->f_path, flags, file->f_cred); in ima_calc_file_hash()
554 if (IS_ERR(f)) in ima_calc_file_hash()
555 return PTR_ERR(f); in ima_calc_file_hash()
560 i_size = i_size_read(file_inode(f)); in ima_calc_file_hash()
563 rc = ima_calc_file_ahash(f, hash); in ima_calc_file_hash()
568 rc = ima_calc_file_shash(f, hash); in ima_calc_file_hash()
571 fput(f); in ima_calc_file_hash()
A Dima_main.c1129 CLASS(fd, f)(kernel_fd); in ima_kexec_cmdline()
1130 if (fd_empty(f)) in ima_kexec_cmdline()
1133 process_buffer_measurement(file_mnt_idmap(fd_file(f)), file_inode(fd_file(f)), in ima_kexec_cmdline()
/security/loadpin/
A Dloadpin.c297 CLASS(fd, f)(fd); in read_trusted_verity_root_digests()
298 if (fd_empty(f)) in read_trusted_verity_root_digests()
307 rc = kernel_read_file(fd_file(f), 0, (void **)&data, SZ_4K - 1, NULL, READING_POLICY); in read_trusted_verity_root_digests()
/security/apparmor/
A Daudit.c256 struct audit_field *f = &rule->fields[i]; in aa_audit_rule_known() local
258 switch (f->type) { in aa_audit_rule_known()
A Dapparmorfs.c446 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_load()
463 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_replace()
483 struct aa_ns *ns = aa_get_ns(f->f_inode->i_private); in profile_remove()
2215 static void *p_start(struct seq_file *f, loff_t *pos) in p_start() argument
2220 f->private = root; in p_start()
2246 struct aa_ns *ns = f->private; in p_next()
2259 static void p_stop(struct seq_file *f, void *p) in p_stop() argument
2262 struct aa_ns *root = f->private, *ns; in p_stop()
2282 struct aa_ns *root = f->private; in seq_show_profile()
2284 aa_label_seq_xprint(f, root, &profile->label, in seq_show_profile()
[all …]
A Dlabel.c1755 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns, in aa_label_seq_xprint() argument
1758 AA_BUG(!f); in aa_label_seq_xprint()
1770 seq_puts(f, str); in aa_label_seq_xprint()
1773 seq_printf(f, "%s (%s)", label->hname, in aa_label_seq_xprint()
1776 seq_puts(f, label->hname); in aa_label_seq_xprint()
/security/apparmor/include/
A Dlabel.h305 void aa_label_seq_xprint(struct seq_file *f, struct aa_ns *ns,
/security/smack/
A Dsmack_lsm.c4716 struct audit_field *f; in smack_audit_rule_known() local
4720 f = &krule->fields[i]; in smack_audit_rule_known()
4722 if (f->type == AUDIT_SUBJ_USER || f->type == AUDIT_OBJ_USER) in smack_audit_rule_known()
/security/selinux/ss/
A Dservices.c3690 struct audit_field *f = &rule->fields[i]; in selinux_audit_rule_known() local
3691 switch (f->type) { in selinux_audit_rule_known()

Completed in 38 milliseconds