Home
last modified time | relevance | path

Searched refs:rules (Results 1 – 7 of 7) sorted by relevance

/security/smack/
DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
26 rules. The developer can use the information to
27 identify which rules are necessary and what accesses
54 delivering a signal in the Smack rules.
/security/safesetid/
Dsecurityfs.c68 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset()
81 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_uid)); in insert_rule()
90 hash_for_each(pol->rules, bucket, rule, next) { in verify_ruleset()
121 hash_init(pol->rules); in handle_policy_update()
Dlsm.h43 DECLARE_HASHTABLE(rules, SETID_HASH_BITS);
Dlsm.c36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup()
/security/apparmor/include/
Dfile.h204 static inline void aa_free_file_rules(struct aa_file_rules *rules) in aa_free_file_rules() argument
206 aa_put_dfa(rules->dfa); in aa_free_file_rules()
207 aa_free_domain_entries(&rules->trans); in aa_free_file_rules()
/security/integrity/ima/
DKconfig60 Disabling this option will disregard LSM based policy rules.
130 IMA policy can now be updated multiple times. The new rules get
131 appended to the original policy. Have in mind that the rules are
144 This option allows the root user to see the current policy rules.
171 bool "IMA build time configured policy rules"
178 policy rules persist after loading a custom policy.
180 Depending on the rules configured, this policy may require kernel
Dima_policy.c604 const char * const *rules; in ima_init_arch_policy() local
613 for (rules = arch_rules; *rules != NULL; rules++) in ima_init_arch_policy()
622 for (rules = arch_rules, i = 0; *rules != NULL; rules++) { in ima_init_arch_policy()
626 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy()