Searched refs:pathname (Results 1 – 9 of 9) sorted by relevance
| /security/loadpin/ |
| A D | loadpin.c | 29 char *cmdline, *pathname; in report_load() local 31 pathname = kstrdup_quotable_file(file, GFP_KERNEL); in report_load() 36 (pathname && pathname[0] != '<') ? "\"" : "", in report_load() 37 pathname, in report_load() 38 (pathname && pathname[0] != '<') ? "\"" : "", in report_load() 43 kfree(pathname); in report_load()
|
| /security/integrity/ima/ |
| A D | ima_main.c | 107 char **pathbuf, const char **pathname, in mmap_violation_check() argument 141 const char **pathname, in ima_rdwr_violation_check() argument 176 ima_add_violation(file, *pathname, iint, in ima_rdwr_violation_check() 246 const char *pathname = NULL; in process_measurement() local 290 &pathbuf, &pathname, filename); in process_measurement() 376 &pathname, filename); in process_measurement() 421 pathname, xattr_value, in process_measurement() 427 &pathname, filename); in process_measurement() 430 ima_audit_measurement(iint, pathname); in process_measurement() 441 pathname, "collect_data", in process_measurement() [all …]
|
| A D | ima_api.c | 442 char *pathname = NULL; in ima_d_path() local 446 pathname = d_absolute_path(path, *pathbuf, PATH_MAX); in ima_d_path() 447 if (IS_ERR(pathname)) { in ima_d_path() 450 pathname = NULL; in ima_d_path() 454 if (!pathname) { in ima_d_path() 459 pathname = namebuf; in ima_d_path() 462 return pathname; in ima_d_path()
|
| A D | Kconfig | 70 hash, defined as 20 bytes, and a null terminated pathname,
|
| /security/tomoyo/ |
| A D | realpath.c | 299 char *tomoyo_realpath_nofollow(const char *pathname) in tomoyo_realpath_nofollow() argument 303 if (pathname && kern_path(pathname, 0, &path) == 0) { in tomoyo_realpath_nofollow()
|
| A D | Kconfig | 11 This selects TOMOYO Linux, pathname-based access control. 62 This is the default pathname of policy loader which is called before 72 This is the default pathname of activation trigger.
|
| A D | group.c | 131 tomoyo_path_matches_group(const struct tomoyo_path_info *pathname, in tomoyo_path_matches_group() argument 140 if (!tomoyo_path_matches_pattern(pathname, member->member_name)) in tomoyo_path_matches_group()
|
| A D | common.h | 960 char *tomoyo_realpath_nofollow(const char *pathname); 968 (const struct tomoyo_path_info *pathname, const struct tomoyo_group *group);
|
| /security/ |
| A D | Kconfig | 133 bool "Security hooks for pathname based access control" 136 This enables the security hooks for pathname based access control. 138 implement pathname based access controls.
|
Completed in 17 milliseconds