Home
last modified time | relevance | path

Searched refs:read (Results 1 – 25 of 29) sorted by relevance

12

/security/ipe/
A Dpolicy_fs.c394 .read = read_policy,
398 .read = read_pkcs7,
402 .read = read_name,
406 .read = read_version,
411 .read = getactive,
A Dfs.c182 .read = getaudit,
187 .read = getenforce,
/security/smack/
A Dsmackfs.c659 .read = seq_read,
947 .read = seq_read,
1021 .read = seq_read,
1284 .read = seq_read,
1540 .read = seq_read,
1608 .read = smk_read_doi,
2035 .read = seq_read,
2264 .read = seq_read,
2399 .read = seq_read,
2472 .read = seq_read,
[all …]
/security/integrity/ima/
A Dima_fs.c59 .read = ima_show_htable_violations,
72 .read = ima_show_measurements_count,
212 .read = seq_read,
287 .read = seq_read,
492 .read = seq_read,
A DKconfig21 as they are read or executed. If an attacker manages
140 It is often useful to be able to read back the IMA policy. It is
/security/selinux/
A Dselinuxfs.c194 .read = sel_read_enforce,
266 .read = sel_read_handle_status,
322 .read = sel_read_policyvers,
354 .read = sel_read_mls,
486 .read = sel_read_policy,
1294 .read = sel_read_bool,
1581 .read = seq_read,
1672 .read = sel_read_initcon,
1735 .read = sel_read_class,
1749 .read = sel_read_perm,
[all …]
/security/loadpin/
A DKconfig6 Any files read through the kernel file reading interface
11 have a root filesystem backed by a read-only device such as
/security/tomoyo/
A Dsecurityfs_if.c121 .read = tomoyo_read_self,
209 .read = tomoyo_read,
A Dcommon.c2527 head->read = tomoyo_read_domain; in tomoyo_open_control()
2537 head->read = tomoyo_read_log; in tomoyo_open_control()
2542 head->read = tomoyo_read_pid; in tomoyo_open_control()
2546 head->read = tomoyo_read_version; in tomoyo_open_control()
2552 head->read = tomoyo_read_stat; in tomoyo_open_control()
2558 head->read = tomoyo_read_profile; in tomoyo_open_control()
2563 head->read = tomoyo_read_query; in tomoyo_open_control()
2568 head->read = tomoyo_read_manager; in tomoyo_open_control()
2576 head->read = NULL; in tomoyo_open_control()
2689 if (!head->read) in tomoyo_read_control()
[all …]
A DKconfig37 You can read the log via /sys/kernel/security/tomoyo/audit.
/security/integrity/evm/
A Devm_secfs.c111 .read = evm_read_key,
280 .read = evm_read_xattrs,
/security/safesetid/
A Dsecurityfs.c302 .read = safesetid_uid_file_read,
307 .read = safesetid_gid_file_read,
/security/landlock/
A DKconfig12 set of access rights (e.g. open a file in read-only, make a
A Dsyscalls.c153 .read = fop_dummy_read,
/security/lockdown/
A DKconfig44 code to read confidential material held inside the kernel are
A Dlockdown.c151 .read = lockdown_read,
/security/keys/
A Duser_defined.c32 .read = user_read,
A Dbig_key.c50 .read = big_key_read,
A Drequest_key_auth.c39 .read = request_key_auth_read,
A Drequest_key.c389 if (ctx->index_key.type->read) in construct_alloc_key()
A Dkeyctl.c810 ret = key->type->read(key, buffer, buflen); in __keyctl_read_key()
864 if (!key->type->read) { in keyctl_read_key()
/security/
A Dinode.c327 .read = lsm_read,
/security/apparmor/
A Dapparmorfs.c607 .read = ns_revision_read,
994 .read = multi_transaction_read,
1032 .read = seq_read,
1051 .read = seq_read, \
1153 .read = seq_read, \
1243 .read = seq_read, \
1418 .read = rawdata_read,
2313 .read = seq_read,
A DKconfig103 except for embedded systems where the image is read only,
/security/keys/trusted-keys/
A Dtrusted_core.c323 .read = trusted_read,

Completed in 43 milliseconds

12