Searched refs:lsm (Results 1 – 14 of 14) sorted by relevance
/Linux-v5.4/security/ |
D | security.c | 64 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument 66 if (!lsm->enabled) in is_enabled() 69 return *lsm->enabled; in is_enabled() 75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 81 if (!lsm->enabled) { in set_enabled() 83 lsm->enabled = &lsm_enabled_true; in set_enabled() 85 lsm->enabled = &lsm_enabled_false; in set_enabled() 86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 88 lsm->enabled = &lsm_enabled_false; in set_enabled() 89 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled() [all …]
|
D | Kconfig | 288 controlled at boot with the "lsm=" parameter.
|
/Linux-v5.4/security/integrity/ima/ |
D | ima_policy.c | 80 } lsm[MAX_LSM_RULES]; member 257 kfree(entry->lsm[i].rule); in ima_lsm_free_rule() 258 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule() 277 memset(nentry->lsm, 0, FIELD_SIZEOF(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule() 280 if (!entry->lsm[i].rule) in ima_lsm_copy_rule() 283 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule() 284 nentry->lsm[i].args_p = kstrdup(entry->lsm[i].args_p, in ima_lsm_copy_rule() 286 if (!nentry->lsm[i].args_p) in ima_lsm_copy_rule() 289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule() 291 nentry->lsm[i].args_p, in ima_lsm_copy_rule() [all …]
|
/Linux-v5.4/Documentation/security/ |
D | index.rst | 11 lsm 12 lsm-development
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | ima_policy | 22 condition:= base | lsm [option] 25 lsm: [[subj_user=] [subj_role=] [subj_type=] 39 lsm: are LSM specific
|
/Linux-v5.4/security/safesetid/ |
D | Makefile | 7 safesetid-y := lsm.o securityfs.o
|
/Linux-v5.4/include/linux/ |
D | lsm_hooks.h | 2073 char *lsm; member 2101 char *lsm); 2123 #define DEFINE_LSM(lsm) \ argument 2124 static struct lsm_info __lsm_##lsm \ 2128 #define DEFINE_EARLY_LSM(lsm) \ argument 2129 static struct lsm_info __early_lsm_##lsm \
|
D | security.h | 432 int security_getprocattr(struct task_struct *p, const char *lsm, char *name, 434 int security_setprocattr(const char *lsm, const char *name, void *value, 1215 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument 1221 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
|
/Linux-v5.4/security/apparmor/ |
D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/Linux-v5.4/Documentation/admin-guide/LSM/ |
D | index.rst | 26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
|
/Linux-v5.4/fs/proc/ |
D | internal.h | 81 const char *lsm; member
|
D | base.c | 149 { .lsm = LSM }) 2542 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read() 2596 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
|
/Linux-v5.4/Documentation/admin-guide/ |
D | kernel-parameters.txt | 2411 lsm.debug [SECURITY] Enable LSM initialization debugging output. 2413 lsm=lsm1,...,lsmN 4314 "lsm=" parameter.
|
/Linux-v5.4/ |
D | MAINTAINERS | 9572 T: git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git lsm/loadpin
|