| /security/ |
| A D | min_addr.c | 32 int mmap_min_addr_handler(const struct ctl_table *table, int write, in mmap_min_addr_handler() argument 37 if (write && !capable(CAP_SYS_RAWIO)) in mmap_min_addr_handler() 40 ret = proc_doulongvec_minmax(table, write, buffer, lenp, ppos); in mmap_min_addr_handler()
|
| A D | device_cgroup.c | 799 .write = devcgroup_access_write, 804 .write = devcgroup_access_write,
|
| A D | Kconfig.hardening | 206 generated "write-what-where" gadgets) in the resulting kernel
|
| /security/ipe/ |
| A D | fs.c | 177 .write = new_policy, 181 .write = setaudit, 186 .write = setenforce,
|
| A D | policy_fs.c | 410 .write = setactive, 415 .write = update_policy, 419 .write = delete_policy,
|
| /security/smack/ |
| A D | smackfs.c | 661 .write = smk_write_load, 949 .write = smk_write_cipso, 1023 .write = smk_write_cipso2, 1609 .write = smk_write_doi, 1687 .write = smk_write_direct, 1765 .write = smk_write_mapped, 1855 .write = smk_write_ambient, 2333 .write = smk_write_access, 2401 .write = smk_write_load2, 2672 .write = smk_write_syslog, [all …]
|
| A D | Kconfig | 50 Sending a signal has been treated as a write operation to the
|
| /security/tomoyo/ |
| A D | common.c | 2526 head->write = tomoyo_write_domain; in tomoyo_open_control() 2541 head->write = tomoyo_write_pid; in tomoyo_open_control() 2551 head->write = tomoyo_write_stat; in tomoyo_open_control() 2557 head->write = tomoyo_write_profile; in tomoyo_open_control() 2562 head->write = tomoyo_write_answer; in tomoyo_open_control() 2593 head->write = NULL; in tomoyo_open_control() 2594 } else if (head->write) { in tomoyo_open_control() 2744 return head->write(head); in tomoyo_parse_policy() 2764 if (!head->write) in tomoyo_write_control() 2952 head.write = tomoyo_write_domain; in tomoyo_load_builtin_policy() [all …]
|
| A D | securityfs_if.c | 120 .write = tomoyo_write_self, 210 .write = tomoyo_write,
|
| A D | common.h | 795 int (*write)(struct tomoyo_io_buffer *head); member
|
| /security/yama/ |
| A D | yama_lsm.c | 432 static int yama_dointvec_minmax(const struct ctl_table *table, int write, in yama_dointvec_minmax() argument 437 if (write && !capable(CAP_SYS_PTRACE)) in yama_dointvec_minmax() 445 return proc_dointvec_minmax(&table_copy, write, buffer, lenp, ppos); in yama_dointvec_minmax()
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 112 .write = evm_write_key, 281 .write = evm_write_xattrs,
|
| /security/safesetid/ |
| A D | securityfs.c | 303 .write = safesetid_uid_file_write, 308 .write = safesetid_gid_file_write,
|
| /security/lockdown/ |
| A D | lockdown.c | 152 .write = lockdown_write,
|
| /security/selinux/ |
| A D | selinuxfs.c | 195 .write = sel_write_enforce, 307 .write = sel_write_disable, 630 .write = sel_write_load, 724 .write = sel_write_checkreqprot, 800 .write = sel_write_validatetrans, 844 .write = selinux_transaction_write, 1295 .write = sel_write_bool, 1346 .write = sel_commit_bools_write, 1507 .write = sel_write_avc_cache_threshold,
|
| /security/landlock/ |
| A D | syscalls.c | 154 .write = fop_dummy_write,
|
| /security/integrity/ima/ |
| A D | ima_fs.c | 491 .write = ima_write_policy,
|
| /security/apparmor/ |
| A D | apparmorfs.c | 455 .write = profile_load, 472 .write = profile_replace, 513 .write = profile_remove, 993 .write = aa_write_access,
|
| A D | lsm.c | 2306 static int apparmor_dointvec(const struct ctl_table *table, int write, in apparmor_dointvec() argument 2314 return proc_dointvec(table, write, buffer, lenp, ppos); in apparmor_dointvec()
|