Home
last modified time | relevance | path

Searched refs:subj (Results 1 – 3 of 3) sorted by relevance

/linux/security/apparmor/
H A Dpolicy.c1318 ssize_t aa_remove_profiles(struct aa_ns *policy_ns, struct aa_label *subj, in aa_remove_profiles() argument
1338 ns = aa_lookupn_ns(policy_ns ? policy_ns : labels_ns(subj), in aa_remove_profiles()
1347 ns = aa_get_ns(policy_ns ? policy_ns : labels_ns(subj)); in aa_remove_profiles()
1372 (void) audit_policy(subj, OP_PROF_RM, ns_name, name, info, in aa_remove_profiles()
1383 (void) audit_policy(subj, OP_PROF_RM, ns_name, name, info, in aa_remove_profiles()
/linux/security/smack/
H A Dsmack_lsm.c4675 struct smack_known *subj, *obj; in smack_post_notification() local
4684 subj = smk_of_task(smack_cred(cred)); in smack_post_notification()
4688 rc = smk_access(subj, obj, MAY_WRITE, &ad); in smack_post_notification()
4689 rc = smk_bu_note("notification", subj, obj, MAY_WRITE, rc); in smack_post_notification()
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst335 …d=0 tty=pts0 ses=2 comm="ld-linux.so" exe="/tmp/ipe-test/lib/ld-linux.so" subj=unconfined key=(nul…
339 …_test" exe="/root/overlake_test/upstream_test/vol_fsverity/bin/mmap_test" subj=unconfined key=(nul…