Searched refs:lsm (Results 1 – 6 of 6) sorted by relevance
101 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument103 if (!lsm->enabled) in is_enabled()106 return *lsm->enabled; in is_enabled()112 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument118 if (!lsm->enabled) { in set_enabled()120 lsm->enabled = &lsm_enabled_true; in set_enabled()122 lsm->enabled = &lsm_enabled_false; in set_enabled()123 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()125 lsm->enabled = &lsm_enabled_false; in set_enabled()126 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()[all …]
281 controlled at boot with the "lsm=" parameter.
90 } lsm[MAX_LSM_RULES]; member352 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule()353 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()386 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()389 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule()392 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()393 nentry->lsm[i].args_p = entry->lsm[i].args_p; in ima_lsm_copy_rule()395 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, in ima_lsm_copy_rule()396 nentry->lsm[i].args_p, in ima_lsm_copy_rule()397 &nentry->lsm[i].rule); in ima_lsm_copy_rule()[all …]
41 goto lsm; in key_task_permission()89 lsm: in key_task_permission()
7 safesetid-y := lsm.o securityfs.o
7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \