Searched refs:rules (Results 1 – 7 of 7) sorted by relevance
/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|
/security/safesetid/ |
D | securityfs.c | 68 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset() 81 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_uid)); in insert_rule() 90 hash_for_each(pol->rules, bucket, rule, next) { in verify_ruleset() 121 hash_init(pol->rules); in handle_policy_update()
|
D | lsm.h | 43 DECLARE_HASHTABLE(rules, SETID_HASH_BITS);
|
D | lsm.c | 36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup()
|
/security/apparmor/include/ |
D | file.h | 204 static inline void aa_free_file_rules(struct aa_file_rules *rules) in aa_free_file_rules() argument 206 aa_put_dfa(rules->dfa); in aa_free_file_rules() 207 aa_free_domain_entries(&rules->trans); in aa_free_file_rules()
|
/security/integrity/ima/ |
D | Kconfig | 60 Disabling this option will disregard LSM based policy rules. 123 IMA policy can now be updated multiple times. The new rules get 124 appended to the original policy. Have in mind that the rules are 136 This option allows the root user to see the current policy rules. 162 bool "IMA build time configured policy rules" 169 policy rules persist after loading a custom policy. 171 Depending on the rules configured, this policy may require kernel
|
D | ima_policy.c | 631 const char * const *rules; in ima_init_arch_policy() local 640 for (rules = arch_rules; *rules != NULL; rules++) in ima_init_arch_policy() 649 for (rules = arch_rules, i = 0; *rules != NULL; rules++) { in ima_init_arch_policy() 653 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy()
|