Home
last modified time | relevance | path

Searched refs:lsm (Results 1 – 25 of 26) sorted by relevance

12

/openbmc/linux/security/
H A Dsecurity.c102 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument
104 if (!lsm->enabled) in is_enabled()
107 return *lsm->enabled; in is_enabled()
113 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
119 if (!lsm->enabled) { in set_enabled()
121 lsm->enabled = &lsm_enabled_true; in set_enabled()
123 lsm->enabled = &lsm_enabled_false; in set_enabled()
124 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
126 lsm->enabled = &lsm_enabled_false; in set_enabled()
127 } else if (lsm->enabled == &lsm_enabled_false) { in set_enabled()
[all …]
H A DKconfig278 This can be controlled at boot with the "lsm=" parameter.
/openbmc/linux/include/linux/
H A Dlsm_hooks.h53 const char *lsm; member
107 const char *lsm);
130 #define DEFINE_LSM(lsm) \ argument
131 static struct lsm_info __lsm_##lsm \
135 #define DEFINE_EARLY_LSM(lsm) \ argument
136 static struct lsm_info __early_lsm_##lsm \
H A Dbpf_types.h76 BPF_PROG_TYPE(BPF_PROG_TYPE_LSM, lsm,
H A Dsecurity.h475 int security_getprocattr(struct task_struct *p, const char *lsm, const char *name,
477 int security_setprocattr(const char *lsm, const char *name, void *value,
1349 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument
1355 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
/openbmc/linux/security/integrity/ima/
H A Dima_policy.c120 } lsm[MAX_LSM_RULES]; member
383 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule()
384 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule()
418 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule()
421 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule()
424 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule()
425 nentry->lsm[i].args_p = entry->lsm[i].args_p; in ima_lsm_copy_rule()
427 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, in ima_lsm_copy_rule()
428 nentry->lsm[i].args_p, in ima_lsm_copy_rule()
429 &nentry->lsm[i].rule, in ima_lsm_copy_rule()
[all …]
/openbmc/linux/Documentation/bpf/libbpf/
H A Dprogram_types.rst102 … | ``BPF_LSM_MAC`` | ``lsm+`` [#lsm]_ …
104 … | | ``lsm.s+`` [#lsm]_ …
200 .. [#lsm] The ``lsm`` attachment format is ``lsm[.s]/<hook>``.
/openbmc/linux/Documentation/security/
H A Dindex.rst11 lsm
12 lsm-development
H A Dlsm.rst64 An interface `/sys/kernel/security/lsm` reports a comma separated list
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/udisks/
H A Dudisks2_2.10.1.bb45 PACKAGECONFIG[lsm] = "--enable-lsm,--disable-lsm,libstoragemgmt"
/openbmc/linux/Documentation/bpf/
H A Dprog_lsm.rst61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must
67 SEC("lsm/file_mprotect")
134 `tools/testing/selftests/bpf/progs/lsm.c`_ and the corresponding
140 .. _tools/testing/selftests/bpf/progs/lsm.c:
141 …t.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/tools/testing/selftests/bpf/progs/lsm.c
/openbmc/linux/security/keys/
H A Dpermission.c41 goto lsm; in key_task_permission()
89 lsm: in key_task_permission()
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dtest_lsm.c54 static int test_lsm(struct lsm *skel) in test_lsm()
100 struct lsm *skel = NULL; in test_test_lsm()
/openbmc/linux/security/safesetid/
H A DMakefile7 safesetid-y := lsm.o securityfs.o
/openbmc/linux/Documentation/ABI/testing/
H A Dima_policy24 condition:= base | lsm [option]
28 lsm: [[subj_user=] [subj_role=] [subj_type=]
49 lsm: are LSM specific
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ez-ipupdate/files/
H A DMakefile.am.patch15 …EXTRA_DIST = getpass.c ez-ipupdate.lsm example.conf example-pgpow.conf example-dhs.conf example-dy…
/openbmc/linux/security/apparmor/
H A DMakefile7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
/openbmc/linux/Documentation/admin-guide/LSM/
H A Dindex.rst26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
/openbmc/linux/fs/proc/
H A Dinternal.h95 const char *lsm; member
H A Dbase.c187 { .lsm = LSM })
2792 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read()
2850 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
/openbmc/linux/Documentation/userspace-api/
H A Dlandlock.rst468 still enable it by adding ``lsm=landlock,[...]`` to
/openbmc/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt3038 lsm.debug [SECURITY] Enable LSM initialization debugging output.
3040 lsm=lsm1,...,lsmN
5792 "lsm=" parameter.
/openbmc/linux/
H A DMAINTAINERS19358 T: git git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git
H A Dopengrok2.0.log[all...]
H A Dopengrok0.0.log[all...]

12