Searched refs:access (Results 1 – 10 of 10) sorted by relevance
/security/ |
D | device_cgroup.c | 35 short access; member 104 walk->access |= ex->access; in dev_exception_add() 132 walk->access &= ~ex->access; in dev_exception_rm() 133 if (!walk->access) { in dev_exception_rm() 236 static void set_access(char *acc, short access) in set_access() argument 240 if (access & DEVCG_ACC_READ) in set_access() 242 if (access & DEVCG_ACC_WRITE) in set_access() 244 if (access & DEVCG_ACC_MKNOD) in set_access() 288 set_access(acc, ex->access); in devcgroup_seq_show() 314 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
D | Kconfig | 11 bool "Restrict unprivileged access to the kernel syslog" 54 implement socket and networking access controls. 74 implement Infiniband access controls. 83 implement per-packet access controls based on labels 91 bool "Security hooks for pathname based access control" 94 This enables the security hooks for pathname based access control. 96 implement pathname based access controls.
|
/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 22 When access is granted by a rule with the "b" mode a 23 message about the access requested is generated. The 25 of access initially with the bringup mode set on the 29 access rule set once the behavior is well understood.
|
D | smack_access.c | 287 static inline void smack_str_from_perm(char *string, int access) in smack_str_from_perm() argument 291 if (access & MAY_READ) in smack_str_from_perm() 293 if (access & MAY_WRITE) in smack_str_from_perm() 295 if (access & MAY_EXEC) in smack_str_from_perm() 297 if (access & MAY_APPEND) in smack_str_from_perm() 299 if (access & MAY_TRANSMUTE) in smack_str_from_perm() 301 if (access & MAY_LOCK) in smack_str_from_perm()
|
D | smack_lsm.c | 2043 static int smk_curacc_on_task(struct task_struct *p, int access, in smk_curacc_on_task() argument 2052 rc = smk_curacc(skp, access, &ad); in smk_curacc_on_task() 2053 rc = smk_bu_task(p, access, rc); in smk_curacc_on_task() 2943 static int smk_curacc_shm(struct kern_ipc_perm *isp, int access) in smk_curacc_shm() argument 2953 rc = smk_curacc(ssp, access, &ad); in smk_curacc_shm() 2954 rc = smk_bu_current("shm", ssp, access, rc); in smk_curacc_shm() 3032 static int smk_curacc_sem(struct kern_ipc_perm *isp, int access) in smk_curacc_sem() argument 3042 rc = smk_curacc(ssp, access, &ad); in smk_curacc_sem() 3043 rc = smk_bu_current("sem", ssp, access, rc); in smk_curacc_sem() 3127 static int smk_curacc_msq(struct kern_ipc_perm *isp, int access) in smk_curacc_msq() argument [all …]
|
/security/yama/ |
D | yama_lsm.c | 46 const char *access; member 62 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 74 static void report_access(const char *access, struct task_struct *target, in report_access() argument 88 access, target->comm, target->pid, in report_access() 99 info->access = access; in report_access()
|
D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|
/security/keys/ |
D | Kconfig | 7 bool "Enable access key retention support" 11 access keys in the kernel. 18 a searchable sequence of keys. Each process is equipped with access 57 LSMs gets to rule on which admin-level processes get to access the
|
/security/tomoyo/ |
D | Kconfig | 13 This selects TOMOYO Linux, pathname-based access control. 26 Some programs access thousands of objects, so running 47 Say Y here if you want to activate access control as soon as built-in
|
/security/selinux/ |
D | Kconfig | 65 This option collects access vector cache statistics to
|