Home
last modified time | relevance | path

Searched refs:lsm (Results 1 – 20 of 20) sorted by relevance

/Linux-v5.10/security/
Dsecurity.c97 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument
99 if (!lsm->enabled) in is_enabled()
102 return *lsm->enabled; in is_enabled()
108 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
114 if (!lsm->enabled) { in set_enabled()
116 lsm->enabled = &lsm_enabled_true; in set_enabled()
118 lsm->enabled = &lsm_enabled_false; in set_enabled()
119 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
121 lsm->enabled = &lsm_enabled_false; in set_enabled()
122 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()
[all …]
DKconfig288 controlled at boot with the "lsm=" parameter.
/Linux-v5.10/include/linux/
Dlsm_hooks.h1556 char *lsm; member
1590 char *lsm);
1612 #define DEFINE_LSM(lsm) \ argument
1613 static struct lsm_info __lsm_##lsm \
1617 #define DEFINE_EARLY_LSM(lsm) \ argument
1618 static struct lsm_info __early_lsm_##lsm \
Dbpf_types.h76 BPF_PROG_TYPE(BPF_PROG_TYPE_LSM, lsm,
Dsecurity.h445 int security_getprocattr(struct task_struct *p, const char *lsm, char *name,
447 int security_setprocattr(const char *lsm, const char *name, void *value,
1249 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument
1255 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
/Linux-v5.10/security/integrity/ima/
Dima_policy.c85 } lsm[MAX_LSM_RULES]; member
331 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule()
332 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()
365 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()
368 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule()
371 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()
372 nentry->lsm[i].args_p = entry->lsm[i].args_p; in ima_lsm_copy_rule()
378 entry->lsm[i].args_p = NULL; in ima_lsm_copy_rule()
380 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, in ima_lsm_copy_rule()
381 nentry->lsm[i].args_p, in ima_lsm_copy_rule()
[all …]
/Linux-v5.10/Documentation/security/
Dindex.rst11 lsm
12 lsm-development
Dlsm.rst64 An interface `/sys/kernel/security/lsm` reports a comma separated list
/Linux-v5.10/Documentation/bpf/
Dbpf_lsm.rst61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must
67 SEC("lsm/file_mprotect")
133 `tools/testing/selftests/bpf/progs/lsm.c`_ and the corresponding
139 .. _tools/testing/selftests/bpf/progs/lsm.c:
140 …t.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/tools/testing/selftests/bpf/progs/lsm.c
/Linux-v5.10/security/keys/
Dpermission.c41 goto lsm; in key_task_permission()
89 lsm: in key_task_permission()
/Linux-v5.10/security/safesetid/
DMakefile7 safesetid-y := lsm.o securityfs.o
/Linux-v5.10/Documentation/ABI/testing/
Dima_policy24 condition:= base | lsm [option]
27 lsm: [[subj_user=] [subj_role=] [subj_type=]
43 lsm: are LSM specific
/Linux-v5.10/tools/testing/selftests/bpf/prog_tests/
Dtest_lsm.c57 struct lsm *skel = NULL; in test_test_lsm()
/Linux-v5.10/security/apparmor/
DMakefile7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
/Linux-v5.10/Documentation/admin-guide/LSM/
Dindex.rst26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
/Linux-v5.10/fs/proc/
Dinternal.h90 const char *lsm; member
Dbase.c151 { .lsm = LSM })
2689 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read()
2743 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
/Linux-v5.10/Documentation/admin-guide/
Dkernel-parameters.txt2597 lsm.debug [SECURITY] Enable LSM initialization debugging output.
2599 lsm=lsm1,...,lsmN
4797 "lsm=" parameter.
/Linux-v5.10/tools/lib/bpf/
Dlibbpf.c8161 BPF_PROG_TYPE_FNS(lsm, BPF_PROG_TYPE_LSM);
/Linux-v5.10/
DMAINTAINERS10254 T: git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git lsm/loadpin