/security/ |
D | device_cgroup.c | 38 short access; member 118 walk->access |= ex->access; in dev_exception_add() 146 walk->access &= ~ex->access; in dev_exception_rm() 147 if (!walk->access) { in dev_exception_rm() 250 static void set_access(char *acc, short access) in set_access() argument 254 if (access & DEVCG_ACC_READ) in set_access() 256 if (access & DEVCG_ACC_WRITE) in set_access() 258 if (access & DEVCG_ACC_MKNOD) in set_access() 302 set_access(acc, ex->access); in devcgroup_seq_show() 328 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
D | Kconfig | 11 bool "Restrict unprivileged access to the kernel syslog" 54 implement socket and networking access controls. 63 implement Infiniband access controls. 72 implement per-packet access controls based on labels 80 bool "Security hooks for pathname based access control" 83 This enables the security hooks for pathname based access control. 85 implement pathname based access controls.
|
/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 22 When access is granted by a rule with the "b" mode a 23 message about the access requested is generated. The 25 of access initially with the bringup mode set on the 29 access rule set once the behavior is well understood.
|
D | smack_access.c | 286 static inline void smack_str_from_perm(char *string, int access) in smack_str_from_perm() argument 290 if (access & MAY_READ) in smack_str_from_perm() 292 if (access & MAY_WRITE) in smack_str_from_perm() 294 if (access & MAY_EXEC) in smack_str_from_perm() 296 if (access & MAY_APPEND) in smack_str_from_perm() 298 if (access & MAY_TRANSMUTE) in smack_str_from_perm() 300 if (access & MAY_LOCK) in smack_str_from_perm()
|
D | smack_lsm.c | 2092 static int smk_curacc_on_task(struct task_struct *p, int access, in smk_curacc_on_task() argument 2101 rc = smk_curacc(skp, access, &ad); in smk_curacc_on_task() 2102 rc = smk_bu_task(p, access, rc); in smk_curacc_on_task() 3026 static int smk_curacc_shm(struct kern_ipc_perm *isp, int access) in smk_curacc_shm() argument 3036 rc = smk_curacc(ssp, access, &ad); in smk_curacc_shm() 3037 rc = smk_bu_current("shm", ssp, access, rc); in smk_curacc_shm() 3115 static int smk_curacc_sem(struct kern_ipc_perm *isp, int access) in smk_curacc_sem() argument 3125 rc = smk_curacc(ssp, access, &ad); in smk_curacc_sem() 3126 rc = smk_bu_current("sem", ssp, access, rc); in smk_curacc_sem() 3210 static int smk_curacc_msq(struct kern_ipc_perm *isp, int access) in smk_curacc_msq() argument [all …]
|
/security/landlock/ |
D | ruleset.c | 186 this->layers[0].access |= (*layers)[0].access; in insert_rule() 223 .access = ~0, in build_check_layer() 227 BUILD_BUG_ON(layer.access < LANDLOCK_MASK_ACCESS_FS); in build_check_layer() 233 const access_mask_t access) in landlock_insert_rule() argument 236 .access = access, in landlock_insert_rule() 301 layers[0].access = walker_rule->layers[0].access; in merge_ruleset()
|
D | ruleset.h | 44 access_mask_t access; member 164 const access_mask_t access);
|
D | Kconfig | 10 tailored access control policies. A Landlock security policy is a 11 set of access rights (e.g. open a file in read-only, make a
|
D | fs.c | 267 if (layer->access & BIT_ULL(access_bit)) in unmask_layers() 1149 access_mask_t access = 0; in get_file_access() local 1155 access = LANDLOCK_ACCESS_FS_READ_FILE; in get_file_access() 1158 access |= LANDLOCK_ACCESS_FS_WRITE_FILE; in get_file_access() 1161 access |= LANDLOCK_ACCESS_FS_EXECUTE; in get_file_access() 1162 return access; in get_file_access()
|
/security/yama/ |
D | yama_lsm.c | 46 const char *access; member 62 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 74 static void report_access(const char *access, struct task_struct *target, in report_access() argument 88 access, target->comm, target->pid, in report_access() 99 info->access = access; in report_access()
|
D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|
/security/tomoyo/ |
D | Kconfig | 13 This selects TOMOYO Linux, pathname-based access control. 26 Some programs access thousands of objects, so running 47 Say Y here if you want to activate access control as soon as built-in
|
/security/keys/ |
D | Kconfig | 7 bool "Enable access key retention support" 11 access keys in the kernel. 18 a searchable sequence of keys. Each process is equipped with access 53 LSMs gets to rule on which admin-level processes get to access the
|
/security/selinux/ |
D | Kconfig | 69 This option collects access vector cache statistics to
|