Home
last modified time | relevance | path

Searched refs:lsm (Results 1 – 5 of 5) sorted by relevance

/security/
Dsecurity.c64 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument
66 if (!lsm->enabled) in is_enabled()
69 return *lsm->enabled; in is_enabled()
75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
81 if (!lsm->enabled) { in set_enabled()
83 lsm->enabled = &lsm_enabled_true; in set_enabled()
85 lsm->enabled = &lsm_enabled_false; in set_enabled()
86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
88 lsm->enabled = &lsm_enabled_false; in set_enabled()
89 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()
[all …]
DKconfig288 controlled at boot with the "lsm=" parameter.
/security/integrity/ima/
Dima_policy.c80 } lsm[MAX_LSM_RULES]; member
257 kfree(entry->lsm[i].rule); in ima_lsm_free_rule()
258 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()
277 memset(nentry->lsm, 0, FIELD_SIZEOF(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()
280 if (!entry->lsm[i].rule) in ima_lsm_copy_rule()
283 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()
284 nentry->lsm[i].args_p = kstrdup(entry->lsm[i].args_p, in ima_lsm_copy_rule()
286 if (!nentry->lsm[i].args_p) in ima_lsm_copy_rule()
289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule()
291 nentry->lsm[i].args_p, in ima_lsm_copy_rule()
[all …]
/security/safesetid/
DMakefile7 safesetid-y := lsm.o securityfs.o
/security/apparmor/
DMakefile7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \