Home
last modified time | relevance | path

Searched refs:lsm (Results 1 – 14 of 14) sorted by relevance

/Linux-v5.4/security/
Dsecurity.c64 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument
66 if (!lsm->enabled) in is_enabled()
69 return *lsm->enabled; in is_enabled()
75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
81 if (!lsm->enabled) { in set_enabled()
83 lsm->enabled = &lsm_enabled_true; in set_enabled()
85 lsm->enabled = &lsm_enabled_false; in set_enabled()
86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
88 lsm->enabled = &lsm_enabled_false; in set_enabled()
89 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()
[all …]
DKconfig288 controlled at boot with the "lsm=" parameter.
/Linux-v5.4/security/integrity/ima/
Dima_policy.c80 } lsm[MAX_LSM_RULES]; member
257 kfree(entry->lsm[i].rule); in ima_lsm_free_rule()
258 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()
277 memset(nentry->lsm, 0, FIELD_SIZEOF(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()
280 if (!entry->lsm[i].rule) in ima_lsm_copy_rule()
283 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()
284 nentry->lsm[i].args_p = kstrdup(entry->lsm[i].args_p, in ima_lsm_copy_rule()
286 if (!nentry->lsm[i].args_p) in ima_lsm_copy_rule()
289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule()
291 nentry->lsm[i].args_p, in ima_lsm_copy_rule()
[all …]
/Linux-v5.4/Documentation/security/
Dindex.rst11 lsm
12 lsm-development
/Linux-v5.4/Documentation/ABI/testing/
Dima_policy22 condition:= base | lsm [option]
25 lsm: [[subj_user=] [subj_role=] [subj_type=]
39 lsm: are LSM specific
/Linux-v5.4/security/safesetid/
DMakefile7 safesetid-y := lsm.o securityfs.o
/Linux-v5.4/include/linux/
Dlsm_hooks.h2073 char *lsm; member
2101 char *lsm);
2123 #define DEFINE_LSM(lsm) \ argument
2124 static struct lsm_info __lsm_##lsm \
2128 #define DEFINE_EARLY_LSM(lsm) \ argument
2129 static struct lsm_info __early_lsm_##lsm \
Dsecurity.h432 int security_getprocattr(struct task_struct *p, const char *lsm, char *name,
434 int security_setprocattr(const char *lsm, const char *name, void *value,
1215 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument
1221 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
/Linux-v5.4/security/apparmor/
DMakefile7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
/Linux-v5.4/Documentation/admin-guide/LSM/
Dindex.rst26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
/Linux-v5.4/fs/proc/
Dinternal.h81 const char *lsm; member
Dbase.c149 { .lsm = LSM })
2542 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read()
2596 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
/Linux-v5.4/Documentation/admin-guide/
Dkernel-parameters.txt2411 lsm.debug [SECURITY] Enable LSM initialization debugging output.
2413 lsm=lsm1,...,lsmN
4314 "lsm=" parameter.
/Linux-v5.4/
DMAINTAINERS9572 T: git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git lsm/loadpin