Searched refs:read (Results 1 – 25 of 29) sorted by relevance
12
| /security/ipe/ |
| A D | policy_fs.c | 394 .read = read_policy, 398 .read = read_pkcs7, 402 .read = read_name, 406 .read = read_version, 411 .read = getactive,
|
| A D | fs.c | 182 .read = getaudit, 187 .read = getenforce,
|
| /security/smack/ |
| A D | smackfs.c | 659 .read = seq_read, 947 .read = seq_read, 1021 .read = seq_read, 1284 .read = seq_read, 1540 .read = seq_read, 1608 .read = smk_read_doi, 2035 .read = seq_read, 2264 .read = seq_read, 2399 .read = seq_read, 2472 .read = seq_read, [all …]
|
| /security/integrity/ima/ |
| A D | ima_fs.c | 59 .read = ima_show_htable_violations, 72 .read = ima_show_measurements_count, 212 .read = seq_read, 287 .read = seq_read, 492 .read = seq_read,
|
| A D | Kconfig | 21 as they are read or executed. If an attacker manages 140 It is often useful to be able to read back the IMA policy. It is
|
| /security/selinux/ |
| A D | selinuxfs.c | 194 .read = sel_read_enforce, 266 .read = sel_read_handle_status, 322 .read = sel_read_policyvers, 354 .read = sel_read_mls, 486 .read = sel_read_policy, 1294 .read = sel_read_bool, 1581 .read = seq_read, 1672 .read = sel_read_initcon, 1735 .read = sel_read_class, 1749 .read = sel_read_perm, [all …]
|
| /security/loadpin/ |
| A D | Kconfig | 6 Any files read through the kernel file reading interface 11 have a root filesystem backed by a read-only device such as
|
| /security/tomoyo/ |
| A D | securityfs_if.c | 121 .read = tomoyo_read_self, 209 .read = tomoyo_read,
|
| A D | common.c | 2527 head->read = tomoyo_read_domain; in tomoyo_open_control() 2537 head->read = tomoyo_read_log; in tomoyo_open_control() 2542 head->read = tomoyo_read_pid; in tomoyo_open_control() 2546 head->read = tomoyo_read_version; in tomoyo_open_control() 2552 head->read = tomoyo_read_stat; in tomoyo_open_control() 2558 head->read = tomoyo_read_profile; in tomoyo_open_control() 2563 head->read = tomoyo_read_query; in tomoyo_open_control() 2568 head->read = tomoyo_read_manager; in tomoyo_open_control() 2576 head->read = NULL; in tomoyo_open_control() 2689 if (!head->read) in tomoyo_read_control() [all …]
|
| A D | Kconfig | 37 You can read the log via /sys/kernel/security/tomoyo/audit.
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 111 .read = evm_read_key, 280 .read = evm_read_xattrs,
|
| /security/safesetid/ |
| A D | securityfs.c | 302 .read = safesetid_uid_file_read, 307 .read = safesetid_gid_file_read,
|
| /security/landlock/ |
| A D | Kconfig | 12 set of access rights (e.g. open a file in read-only, make a
|
| A D | syscalls.c | 153 .read = fop_dummy_read,
|
| /security/lockdown/ |
| A D | Kconfig | 44 code to read confidential material held inside the kernel are
|
| A D | lockdown.c | 151 .read = lockdown_read,
|
| /security/keys/ |
| A D | user_defined.c | 32 .read = user_read,
|
| A D | big_key.c | 50 .read = big_key_read,
|
| A D | request_key_auth.c | 39 .read = request_key_auth_read,
|
| A D | request_key.c | 389 if (ctx->index_key.type->read) in construct_alloc_key()
|
| A D | keyctl.c | 810 ret = key->type->read(key, buffer, buflen); in __keyctl_read_key() 864 if (!key->type->read) { in keyctl_read_key()
|
| /security/ |
| A D | inode.c | 327 .read = lsm_read,
|
| /security/apparmor/ |
| A D | apparmorfs.c | 607 .read = ns_revision_read, 994 .read = multi_transaction_read, 1032 .read = seq_read, 1051 .read = seq_read, \ 1153 .read = seq_read, \ 1243 .read = seq_read, \ 1418 .read = rawdata_read, 2313 .read = seq_read,
|
| A D | Kconfig | 103 except for embedded systems where the image is read only,
|
| /security/keys/trusted-keys/ |
| A D | trusted_core.c | 323 .read = trusted_read,
|
Completed in 43 milliseconds
12