/kernel/linux/linux-5.10/security/ |
H A D | security.c | 100 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument 102 if (!lsm->enabled) in is_enabled() 105 return *lsm->enabled; in is_enabled() 111 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 117 if (!lsm->enabled) { in set_enabled() 119 lsm->enabled = &lsm_enabled_true; in set_enabled() 121 lsm->enabled = &lsm_enabled_false; in set_enabled() 122 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 124 lsm->enabled = &lsm_enabled_false; in set_enabled() 125 } else if (lsm in set_enabled() 134 exists_ordered_lsm(struct lsm_info *lsm) exists_ordered_lsm() argument 147 append_ordered_lsm(struct lsm_info *lsm, const char *from) append_ordered_lsm() argument 166 lsm_allowed(struct lsm_info *lsm) lsm_allowed() argument 212 prepare_lsm(struct lsm_info *lsm) prepare_lsm() argument 231 initialize_lsm(struct lsm_info *lsm) initialize_lsm() argument 245 struct lsm_info *lsm; ordered_lsm_parse() local 321 struct lsm_info **lsm; ordered_lsm_init() local 369 struct lsm_info *lsm; early_security_init() local 392 struct lsm_info *lsm; security_init() local 435 match_last_lsm(const char *list, const char *lsm) match_last_lsm() argument 479 security_add_hooks(struct security_hook_list *hooks, int count, char *lsm) security_add_hooks() argument 2012 security_getprocattr(struct task_struct *p, const char *lsm, char *name, char **value) security_getprocattr() argument 2025 security_setprocattr(const char *lsm, const char *name, void *value, size_t size) security_setprocattr() argument [all...] |
/kernel/linux/linux-6.6/security/ |
H A D | security.c | 102 static bool __init is_enabled(struct lsm_info *lsm) in is_enabled() argument 104 if (!lsm->enabled) in is_enabled() 107 return *lsm->enabled; in is_enabled() 113 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 119 if (!lsm->enabled) { in set_enabled() 121 lsm->enabled = &lsm_enabled_true; in set_enabled() 123 lsm->enabled = &lsm_enabled_false; in set_enabled() 124 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 126 lsm->enabled = &lsm_enabled_false; in set_enabled() 127 } else if (lsm in set_enabled() 136 exists_ordered_lsm(struct lsm_info *lsm) exists_ordered_lsm() argument 149 append_ordered_lsm(struct lsm_info *lsm, const char *from) append_ordered_lsm() argument 168 lsm_allowed(struct lsm_info *lsm) lsm_allowed() argument 218 prepare_lsm(struct lsm_info *lsm) prepare_lsm() argument 237 initialize_lsm(struct lsm_info *lsm) initialize_lsm() argument 251 struct lsm_info *lsm; ordered_lsm_parse() local 335 struct lsm_info **lsm, *early; report_lsm_order() local 354 struct lsm_info **lsm; ordered_lsm_init() local 405 struct lsm_info *lsm; early_security_init() local 429 struct lsm_info *lsm; security_init() local 476 match_last_lsm(const char *list, const char *lsm) match_last_lsm() argument 520 security_add_hooks(struct security_hook_list *hooks, int count, const char *lsm) security_add_hooks() argument 3832 security_getprocattr(struct task_struct *p, const char *lsm, const char *name, char **value) security_getprocattr() argument 3857 security_setprocattr(const char *lsm, const char *name, void *value, size_t size) security_setprocattr() argument [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | lsm_hooks.h | 169 * @opts binary data structure containing all lsm mount data 1560 char *lsm; member 1594 char *lsm); 1616 #define DEFINE_LSM(lsm) \ 1617 static struct lsm_info __lsm_##lsm \ 1621 #define DEFINE_EARLY_LSM(lsm) \ 1622 static struct lsm_info __early_lsm_##lsm \
|
H A D | security.h | 450 int security_getprocattr(struct task_struct *p, const char *lsm, char *name, 452 int security_setprocattr(const char *lsm, const char *name, void *value, 1266 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument 1272 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | lsm_hooks.h | 53 const char *lsm; member 107 const char *lsm); 130 #define DEFINE_LSM(lsm) \ 131 static struct lsm_info __lsm_##lsm \ 135 #define DEFINE_EARLY_LSM(lsm) \ 136 static struct lsm_info __early_lsm_##lsm \
|
H A D | security.h | 475 int security_getprocattr(struct task_struct *p, const char *lsm, const char *name, 477 int security_setprocattr(const char *lsm, const char *name, void *value, 1349 static inline int security_getprocattr(struct task_struct *p, const char *lsm, in security_getprocattr() argument 1355 static inline int security_setprocattr(const char *lsm, char *name, in security_setprocattr() argument
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_policy.c | 85 } lsm[MAX_LSM_RULES]; member 331 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule() 332 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule() 359 * lsm rules can change in ima_lsm_copy_rule() 365 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule() 368 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule() 371 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule() 372 nentry->lsm[ in ima_lsm_copy_rule() [all...] |
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_policy.c | 120 } lsm[MAX_LSM_RULES]; member 383 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule() 384 kfree(entry->lsm[i].args_p); in ima_lsm_free_rule() 411 * lsm rules can change in ima_lsm_copy_rule() 417 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); in ima_lsm_copy_rule() 420 if (!entry->lsm[i].args_p) in ima_lsm_copy_rule() 423 nentry->lsm[i].type = entry->lsm[i].type; in ima_lsm_copy_rule() 424 nentry->lsm[ in ima_lsm_copy_rule() [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | permission.c | 41 goto lsm; in key_task_permission() 89 lsm: in key_task_permission()
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | permission.c | 41 goto lsm; in key_task_permission() 89 lsm: in key_task_permission()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_lsm.c | 14 #include "lsm.skel.h" 54 static int test_lsm(struct lsm *skel) in test_lsm() 100 struct lsm *skel = NULL; in test_test_lsm()
|
/kernel/linux/linux-5.10/security/safesetid/ |
H A D | Makefile | 7 safesetid-y := lsm.o securityfs.o
|
/kernel/linux/linux-6.6/security/safesetid/ |
H A D | Makefile | 7 safesetid-y := lsm.o securityfs.o
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_lsm.c | 15 #include "lsm.skel.h" 57 struct lsm *skel = NULL; in test_test_lsm() 62 if (CHECK(!skel, "skel_load", "lsm skeleton failed\n")) in test_test_lsm() 66 if (CHECK(err, "attach", "lsm attach failed: %d\n", err)) in test_test_lsm()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | Makefile | 7 path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
/kernel/linux/linux-5.10/fs/proc/ |
H A D | internal.h | 90 const char *lsm; member
|
H A D | base.c | 160 { .lsm = LSM }) 2915 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read() 2973 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
|
/kernel/linux/linux-6.6/fs/proc/ |
H A D | internal.h | 95 const char *lsm; member
|
H A D | base.c | 164 { .lsm = LSM }) 2911 length = security_getprocattr(task, PROC_I(inode)->op.lsm, in proc_pid_attr_read() 2969 rv = security_setprocattr(PROC_I(inode)->op.lsm, in proc_pid_attr_write()
|
/kernel/linux/linux-5.10/tools/lib/bpf/ |
H A D | libbpf.c | 8245 BPF_PROG_TYPE_FNS(lsm, BPF_PROG_TYPE_LSM); 8375 SEC_DEF("lsm/", LSM, 8379 SEC_DEF("lsm.s/", LSM,
|