Searched refs:lsm (Results 1 – 5 of 5) sorted by relevance
64 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument66 if (!lsm->enabled) in is_enabled()69 return *lsm->enabled; in is_enabled()75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument81 if (!lsm->enabled) { in set_enabled()83 lsm->enabled = &lsm_enabled_true; in set_enabled()85 lsm->enabled = &lsm_enabled_false; in set_enabled()86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()88 lsm->enabled = &lsm_enabled_false; in set_enabled()89 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()[all …]
288 controlled at boot with the "lsm=" parameter.
80 } lsm[MAX_LSM_RULES]; member257 kfree(entry->lsm[i].rule); in ima_lsm_free_rule()258 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()277 memset(nentry->lsm, 0, FIELD_SIZEOF(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()280 if (!entry->lsm[i].rule) in ima_lsm_copy_rule()283 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()284 nentry->lsm[i].args_p = kstrdup(entry->lsm[i].args_p, in ima_lsm_copy_rule()286 if (!nentry->lsm[i].args_p) in ima_lsm_copy_rule()289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule()291 nentry->lsm[i].args_p, in ima_lsm_copy_rule()[all …]
7 safesetid-y := lsm.o securityfs.o
7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \