Searched refs:lsm (Results 1 – 18 of 18) sorted by relevance
| /linux/security/ |
| H A D | lsm_init.c | 104 static void __init lsm_enabled_set(struct lsm_info *lsm, bool enabled) in lsm_enabled_set() argument 110 if (!lsm->enabled || in lsm_enabled_set() 111 lsm->enabled == &lsm_enabled_true || in lsm_enabled_set() 112 lsm->enabled == &lsm_enabled_false) { in lsm_enabled_set() 113 lsm->enabled = enabled ? &lsm_enabled_true : &lsm_enabled_false; in lsm_enabled_set() 115 *lsm->enabled = enabled; in lsm_enabled_set() 123 static inline bool lsm_is_enabled(struct lsm_info *lsm) in lsm_is_enabled() argument 125 return (lsm->enabled ? *lsm->enabled : false); in lsm_is_enabled() 132 static bool __init lsm_order_exists(struct lsm_info *lsm) in lsm_order_exists() argument 137 if (*check == lsm) in lsm_order_exists() [all …]
|
| H A D | Kconfig | 283 This can be controlled at boot with the "lsm=" parameter.
|
| /linux/security/integrity/ima/ |
| H A D | ima_policy.c | 122 } lsm[MAX_LSM_RULES]; member 388 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule() 389 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule() 424 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule() 427 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule() 430 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule() 431 nentry->lsm[i].args_p = entry->lsm[i].args_p; in ima_lsm_copy_rule() 433 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, in ima_lsm_copy_rule() 434 nentry->lsm[i].args_p, in ima_lsm_copy_rule() 435 &nentry->lsm[i].rule, in ima_lsm_copy_rule() [all …]
|
| /linux/Documentation/security/ |
| H A D | index.rst | 12 lsm 13 lsm-development
|
| H A D | lsm.rst | 64 An interface `/sys/kernel/security/lsm` reports a comma separated list
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | index.rst | 20 lsm 21 lsm-development
|
| H A D | lsm-development.rst | 4 :Original: Documentation/security/lsm-development.rst
|
| /linux/Documentation/bpf/ |
| H A D | prog_lsm.rst | 61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must 67 SEC("lsm/file_mprotect") 134 `tools/testing/selftests/bpf/progs/lsm.c`_ and the corresponding 140 .. _tools/testing/selftests/bpf/progs/lsm.c: 141 …t.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/tools/testing/selftests/bpf/progs/lsm.c
|
| /linux/security/keys/ |
| H A D | permission.c | 41 goto lsm; in key_task_permission() 89 lsm: in key_task_permission()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | test_lsm.c | 14 #include "lsm.skel.h" 55 static int test_lsm(struct lsm *skel) in test_lsm() 101 struct lsm *skel = NULL; in test_lsm_basic()
|
| /linux/security/safesetid/ |
| H A D | Makefile | 7 safesetid-y := lsm.o securityfs.o
|
| /linux/Documentation/userspace-api/ |
| H A D | lsm.rst | 72 * Documentation/security/lsm.rst 73 * Documentation/security/lsm-development.rst
|
| /linux/Documentation/ABI/testing/ |
| H A D | ima_policy | 24 condition:= base | lsm [option] 29 lsm: [[subj_user=] [subj_role=] [subj_type=] 50 lsm: are LSM specific
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 395 …CA42B51F68962354BA083122A20BB846F26765076DD8EED7B8F4DB auid=4294967295 ses=4294967295 lsm=ipe res=1 429 | lsm | string | No | The lsm name associated with the event … 439 …68962354BA083122A20BB846F26765076DD8EED7B8F4DB auid=4294967295 ses=4294967295 lsm=ipe res=1 errno=0 462 | lsm | string | No | The lsm name associated with the event … 504 …): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=ipe res=1 508 …): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=ipe res=1 531 | lsm | string | No | The lsm name associated with the event …
|
| /linux/security/apparmor/ |
| H A D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
| /linux/tools/testing/selftests/ |
| H A D | Makefile | 60 TARGETS += lsm
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 3736 lsm.debug [SECURITY] Enable LSM initialization debugging output. 3738 lsm=lsm1,...,lsmN 6938 "lsm=" parameter.
|
| /linux/ |
| H A D | MAINTAINERS | 6784 T: git https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git 14883 T: git https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git 23936 T: git https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git 23937 F: include/linux/lsm/ 23942 F: include/uapi/linux/lsm.h 23944 F: tools/testing/selftests/lsm/
|