Searched refs:access (Results 1 – 10 of 10) sorted by relevance
/security/ |
D | device_cgroup.c | 44 short access; member 113 walk->access |= ex->access; in dev_exception_add() 141 walk->access &= ~ex->access; in dev_exception_rm() 142 if (!walk->access) { in dev_exception_rm() 245 static void set_access(char *acc, short access) in set_access() argument 249 if (access & ACC_READ) in set_access() 251 if (access & ACC_WRITE) in set_access() 253 if (access & ACC_MKNOD) in set_access() 297 set_access(acc, ex->access); in devcgroup_seq_show() 323 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
D | Kconfig | 10 bool "Restrict unprivileged access to the kernel syslog" 63 implement socket and networking access controls. 83 implement Infiniband access controls. 92 implement per-packet access controls based on labels 100 bool "Security hooks for pathname based access control" 103 This enables the security hooks for pathname based access control. 105 implement pathname based access controls.
|
/security/smack/ |
D | Kconfig | 16 bool "Reporting on access granted by Smack rules" 20 Enable the bring-up ("b") access mode in Smack rules. 21 When access is granted by a rule with the "b" mode a 22 message about the access requested is generated. The 24 of access initially with the bringup mode set on the 28 access rule set once the behavior is well understood.
|
D | smack_access.c | 291 static inline void smack_str_from_perm(char *string, int access) in smack_str_from_perm() argument 295 if (access & MAY_READ) in smack_str_from_perm() 297 if (access & MAY_WRITE) in smack_str_from_perm() 299 if (access & MAY_EXEC) in smack_str_from_perm() 301 if (access & MAY_APPEND) in smack_str_from_perm() 303 if (access & MAY_TRANSMUTE) in smack_str_from_perm() 305 if (access & MAY_LOCK) in smack_str_from_perm()
|
D | smack_lsm.c | 2095 static int smk_curacc_on_task(struct task_struct *p, int access, in smk_curacc_on_task() argument 2104 rc = smk_curacc(skp, access, &ad); in smk_curacc_on_task() 2105 rc = smk_bu_task(p, access, rc); in smk_curacc_on_task() 2991 static int smk_curacc_shm(struct shmid_kernel *shp, int access) in smk_curacc_shm() argument 3001 rc = smk_curacc(ssp, access, &ad); in smk_curacc_shm() 3002 rc = smk_bu_current("shm", ssp, access, rc); in smk_curacc_shm() 3118 static int smk_curacc_sem(struct sem_array *sma, int access) in smk_curacc_sem() argument 3128 rc = smk_curacc(ssp, access, &ad); in smk_curacc_sem() 3129 rc = smk_bu_current("sem", ssp, access, rc); in smk_curacc_sem() 3251 static int smk_curacc_msq(struct msg_queue *msq, int access) in smk_curacc_msq() argument [all …]
|
/security/yama/ |
D | yama_lsm.c | 50 const char *access; member 66 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 78 static void report_access(const char *access, struct task_struct *target, in report_access() argument 92 access, target->comm, target->pid, in report_access() 103 info->access = access; in report_access()
|
D | Kconfig | 8 access controls. Currently available is ptrace scope restriction.
|
/security/keys/ |
D | Kconfig | 6 bool "Enable access key retention support" 10 access keys in the kernel. 17 a searchable sequence of keys. Each process is equipped with access 38 LSMs gets to rule on which admin-level processes get to access the
|
/security/tomoyo/ |
D | Kconfig | 12 This selects TOMOYO Linux, pathname-based access control. 25 Some programs access thousands of objects, so running 46 Say Y here if you want to activate access control as soon as built-in
|
/security/selinux/ |
D | Kconfig | 79 This option collects access vector cache statistics to
|