Home
last modified time | relevance | path

Searched refs:rules (Results 1 – 7 of 7) sorted by relevance

/security/smack/
DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
26 rules. The developer can use the information to
27 identify which rules are necessary and what accesses
54 delivering a signal in the Smack rules.
/security/safesetid/
Dsecurityfs.c68 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset()
81 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_uid)); in insert_rule()
90 hash_for_each(pol->rules, bucket, rule, next) { in verify_ruleset()
121 hash_init(pol->rules); in handle_policy_update()
Dlsm.h43 DECLARE_HASHTABLE(rules, SETID_HASH_BITS);
Dlsm.c36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup()
/security/apparmor/include/
Dfile.h204 static inline void aa_free_file_rules(struct aa_file_rules *rules) in aa_free_file_rules() argument
206 aa_put_dfa(rules->dfa); in aa_free_file_rules()
207 aa_free_domain_entries(&rules->trans); in aa_free_file_rules()
/security/integrity/ima/
DKconfig60 Disabling this option will disregard LSM based policy rules.
123 IMA policy can now be updated multiple times. The new rules get
124 appended to the original policy. Have in mind that the rules are
136 This option allows the root user to see the current policy rules.
162 bool "IMA build time configured policy rules"
169 policy rules persist after loading a custom policy.
171 Depending on the rules configured, this policy may require kernel
Dima_policy.c631 const char * const *rules; in ima_init_arch_policy() local
640 for (rules = arch_rules; *rules != NULL; rules++) in ima_init_arch_policy()
649 for (rules = arch_rules, i = 0; *rules != NULL; rules++) { in ima_init_arch_policy()
653 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy()