/Linux-v5.15/security/ |
D | security.c | 99 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument 101 if (!lsm->enabled) in is_enabled() 104 return *lsm->enabled; in is_enabled() 110 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 116 if (!lsm->enabled) { in set_enabled() 118 lsm->enabled = &lsm_enabled_true; in set_enabled() 120 lsm->enabled = &lsm_enabled_false; in set_enabled() 121 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 123 lsm->enabled = &lsm_enabled_false; in set_enabled() 124 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled() [all …]
|
D | Kconfig | 289 controlled at boot with the "lsm=" parameter.
|
/Linux-v5.15/include/linux/ |
D | lsm_hooks.h | 1581 char *lsm; member 1616 char *lsm); 1638 #define DEFINE_LSM(lsm) \ argument 1639 static struct lsm_info __lsm_##lsm \ 1643 #define DEFINE_EARLY_LSM(lsm) \ argument 1644 static struct lsm_info __early_lsm_##lsm \
|
D | bpf_types.h | 76 BPF_PROG_TYPE(BPF_PROG_TYPE_LSM, lsm,
|
D | security.h | 461 int security_getprocattr(struct task_struct *p, const char *lsm, char *name, 463 int security_setprocattr(const char *lsm, const char *name, void *value, 1293 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument 1299 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
|
/Linux-v5.15/security/integrity/ima/ |
D | ima_policy.c | 90 } lsm[MAX_LSM_RULES]; member 352 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule() 353 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule() 386 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule() 389 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule() 392 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule() 393 nentry->lsm[i].args_p = entry->lsm[i].args_p; in ima_lsm_copy_rule() 399 entry->lsm[i].args_p = NULL; in ima_lsm_copy_rule() 401 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, in ima_lsm_copy_rule() 402 nentry->lsm[i].args_p, in ima_lsm_copy_rule() [all …]
|
/Linux-v5.15/Documentation/security/ |
D | index.rst | 11 lsm 12 lsm-development
|
D | lsm.rst | 64 An interface `/sys/kernel/security/lsm` reports a comma separated list
|
/Linux-v5.15/Documentation/bpf/ |
D | bpf_lsm.rst | 61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must 67 SEC("lsm/file_mprotect") 134 `tools/testing/selftests/bpf/progs/lsm.c`_ and the corresponding 140 .. _tools/testing/selftests/bpf/progs/lsm.c: 141 …t.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/tools/testing/selftests/bpf/progs/lsm.c
|
/Linux-v5.15/security/keys/ |
D | permission.c | 41 goto lsm; in key_task_permission() 89 lsm: in key_task_permission()
|
/Linux-v5.15/tools/testing/selftests/bpf/prog_tests/ |
D | test_lsm.c | 54 static int test_lsm(struct lsm *skel) in test_lsm() 99 struct lsm *skel = NULL; in test_test_lsm()
|
/Linux-v5.15/security/safesetid/ |
D | Makefile | 7 safesetid-y := lsm.o securityfs.o
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | ima_policy | 24 condition:= base | lsm [option] 27 lsm: [[subj_user=] [subj_role=] [subj_type=] 44 lsm: are LSM specific
|
/Linux-v5.15/security/apparmor/ |
D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/Linux-v5.15/Documentation/admin-guide/LSM/ |
D | index.rst | 26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
|
/Linux-v5.15/fs/proc/ |
D | internal.h | 90 const char *lsm; member
|
D | base.c | 151 { .lsm = LSM }) 2698 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read() 2756 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
|
/Linux-v5.15/Documentation/admin-guide/ |
D | kernel-parameters.txt | 2729 lsm.debug [SECURITY] Enable LSM initialization debugging output. 2731 lsm=lsm1,...,lsmN 5114 "lsm=" parameter.
|
/Linux-v5.15/tools/lib/bpf/ |
D | libbpf.c | 7847 BPF_PROG_TYPE_FNS(lsm, BPF_PROG_TYPE_LSM);
|
/Linux-v5.15/ |
D | MAINTAINERS | 10509 T: git https://github.com/landlock-lsm/linux.git 10932 T: git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git lsm/loadpin
|