Searched refs:rules (Results 1 – 7 of 7) sorted by relevance
/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|
/security/safesetid/ |
D | securityfs.c | 68 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset() 81 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_uid)); in insert_rule() 90 hash_for_each(pol->rules, bucket, rule, next) { in verify_ruleset() 121 hash_init(pol->rules); in handle_policy_update()
|
D | lsm.h | 43 DECLARE_HASHTABLE(rules, SETID_HASH_BITS);
|
D | lsm.c | 36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup()
|
/security/apparmor/include/ |
D | file.h | 204 static inline void aa_free_file_rules(struct aa_file_rules *rules) in aa_free_file_rules() argument 206 aa_put_dfa(rules->dfa); in aa_free_file_rules() 207 aa_free_domain_entries(&rules->trans); in aa_free_file_rules()
|
/security/integrity/ima/ |
D | Kconfig | 60 Disabling this option will disregard LSM based policy rules. 130 IMA policy can now be updated multiple times. The new rules get 131 appended to the original policy. Have in mind that the rules are 144 This option allows the root user to see the current policy rules. 171 bool "IMA build time configured policy rules" 178 policy rules persist after loading a custom policy. 180 Depending on the rules configured, this policy may require kernel
|
D | ima_policy.c | 604 const char * const *rules; in ima_init_arch_policy() local 613 for (rules = arch_rules; *rules != NULL; rules++) in ima_init_arch_policy() 622 for (rules = arch_rules, i = 0; *rules != NULL; rules++) { in ima_init_arch_policy() 626 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy()
|