Home
last modified time | relevance | path

Searched refs:other (Results 1 – 11 of 11) sorted by relevance

/security/selinux/ss/
Dconditional.c269 struct cond_av_list *other; member
278 struct cond_av_list *other = data->other, *list, *cur; in cond_insertf() local
301 if (other) { in cond_insertf()
309 for (cur = other; cur; cur = cur->next) { in cond_insertf()
355 …d_av_list(struct policydb *p, void *fp, struct cond_av_list **ret_list, struct cond_av_list *other) in cond_read_av_list() argument
374 data.other = other; in cond_read_av_list()
/security/smack/
DKconfig12 of other mandatory security schemes.
30 "permissive" mode of other systems.
Dsmack_lsm.c3706 struct sock *other, struct sock *newsk) in smack_unix_stream_connect() argument
3711 struct socket_smack *osp = other->sk_security; in smack_unix_stream_connect()
3724 smk_ad_setfield_u_net_sk(&ad, other); in smack_unix_stream_connect()
3756 static int smack_unix_may_send(struct socket *sock, struct socket *other) in smack_unix_may_send() argument
3759 struct socket_smack *osp = other->sk->sk_security; in smack_unix_may_send()
3767 smk_ad_setfield_u_net_sk(&ad, other->sk); in smack_unix_may_send()
/security/yama/
DKconfig9 Like capabilities, this security module stacks with other LSMs.
/security/loadpin/
DKconfig8 enabled, any files that come from other filesystems will be
/security/apparmor/
DKconfig72 function entry preconditions but also exist at other key
/security/integrity/ima/
DKconfig18 values of executables and other sensitive system files,
203 revoked IMA keys. It is consulted before any other keyring. If
/security/keys/
DKconfig69 if the boot PCRs and other criteria match. Userspace will only ever
/security/
Dsecurity.c1334 int security_unix_stream_connect(struct sock *sock, struct sock *other, struct sock *newsk) in security_unix_stream_connect() argument
1336 return call_int_hook(unix_stream_connect, 0, sock, other, newsk); in security_unix_stream_connect()
1340 int security_unix_may_send(struct socket *sock, struct socket *other) in security_unix_may_send() argument
1342 return call_int_hook(unix_may_send, 0, sock, other); in security_unix_may_send()
DKconfig150 On arm and other archs it should not be higher than 32768.
/security/selinux/
Dhooks.c4687 struct sock *other, in selinux_socket_unix_stream_connect() argument
4691 struct sk_security_struct *sksec_other = other->sk_security; in selinux_socket_unix_stream_connect()
4699 ad.u.net->sk = other; in selinux_socket_unix_stream_connect()
4721 struct socket *other) in selinux_socket_unix_may_send() argument
4724 struct sk_security_struct *osec = other->sk->sk_security; in selinux_socket_unix_may_send()
4730 ad.u.net->sk = other->sk; in selinux_socket_unix_may_send()