Searched refs:other (Results 1 – 13 of 13) sorted by relevance
/security/selinux/ss/ |
D | conditional.c | 263 struct cond_av_list *other; member 272 struct cond_av_list *other = data->other, *list, *cur; in cond_insertf() local 295 if (other) { in cond_insertf() 303 for (cur = other; cur; cur = cur->next) { in cond_insertf() 349 …d_av_list(struct policydb *p, void *fp, struct cond_av_list **ret_list, struct cond_av_list *other) in cond_read_av_list() argument 367 data.other = other; in cond_read_av_list()
|
/security/smack/ |
D | Kconfig | 13 of other mandatory security schemes. 31 "permissive" mode of other systems.
|
D | smack_lsm.c | 3586 struct sock *other, struct sock *newsk) in smack_unix_stream_connect() argument 3591 struct socket_smack *osp = other->sk_security; in smack_unix_stream_connect() 3604 smk_ad_setfield_u_net_sk(&ad, other); in smack_unix_stream_connect() 3636 static int smack_unix_may_send(struct socket *sock, struct socket *other) in smack_unix_may_send() argument 3639 struct socket_smack *osp = other->sk->sk_security; in smack_unix_may_send() 3647 smk_ad_setfield_u_net_sk(&ad, other->sk); in smack_unix_may_send()
|
/security/yama/ |
D | Kconfig | 10 Like capabilities, this security module stacks with other LSMs.
|
/security/loadpin/ |
D | Kconfig | 9 enabled, any files that come from other filesystems will be
|
/security/lockdown/ |
D | Kconfig | 17 unconditionally be called before any other LSMs.
|
/security/apparmor/ |
D | Kconfig | 57 function entry preconditions but also exist at other key
|
/security/ |
D | Kconfig.hardening | 130 sees a 1% slowdown, other systems and workloads may vary and you 145 the lowest border of the kernel stack (and for some other purposes).
|
D | security.c | 1962 int security_unix_stream_connect(struct sock *sock, struct sock *other, struct sock *newsk) in security_unix_stream_connect() argument 1964 return call_int_hook(unix_stream_connect, 0, sock, other, newsk); in security_unix_stream_connect() 1968 int security_unix_may_send(struct socket *sock, struct socket *other) in security_unix_may_send() argument 1970 return call_int_hook(unix_may_send, 0, sock, other); in security_unix_may_send()
|
D | Kconfig | 141 On arm and other archs it should not be higher than 32768.
|
/security/integrity/ima/ |
D | Kconfig | 20 values of executables and other sensitive system files, 285 revoked IMA keys. It is consulted before any other keyring. If
|
/security/keys/ |
D | Kconfig | 88 if the boot PCRs and other criteria match. Userspace will only ever
|
/security/selinux/ |
D | hooks.c | 4874 struct sock *other, in selinux_socket_unix_stream_connect() argument 4878 struct sk_security_struct *sksec_other = other->sk_security; in selinux_socket_unix_stream_connect() 4886 ad.u.net->sk = other; in selinux_socket_unix_stream_connect() 4909 struct socket *other) in selinux_socket_unix_may_send() argument 4912 struct sk_security_struct *osec = other->sk->sk_security; in selinux_socket_unix_may_send() 4918 ad.u.net->sk = other->sk; in selinux_socket_unix_may_send()
|