Searched refs:other (Results 1 – 15 of 15) sorted by relevance
| /security/landlock/ |
| A D | task.c | 235 static bool sock_is_scoped(struct sock *const other, in sock_is_scoped() argument 241 lockdep_assert_held(&unix_sk(other)->lock); in sock_is_scoped() 266 struct sock *const other, in hook_unix_stream_connect() argument 278 if (!is_abstract_socket(other)) in hook_unix_stream_connect() 281 if (!sock_is_scoped(other, subject->domain)) in hook_unix_stream_connect() 289 .sk = other, in hook_unix_stream_connect() 298 struct socket *const other) in hook_unix_may_send() argument 312 if (unix_peer(sock->sk) == other->sk) in hook_unix_may_send() 315 if (!is_abstract_socket(other->sk)) in hook_unix_may_send() 318 if (!sock_is_scoped(other->sk, subject->domain)) in hook_unix_may_send() [all …]
|
| /security/selinux/ss/ |
| A D | conditional.c | 251 struct cond_av_list *other; member 259 struct cond_av_list *other = data->other; in cond_insertf() local 282 if (other) { in cond_insertf() 291 for (i = 0; i < other->len; i++) { in cond_insertf() 292 if (other->nodes[i] == node_ptr) { in cond_insertf() 322 struct cond_av_list *other) in cond_read_av_list() argument 342 data.other = other; in cond_read_av_list()
|
| /security/loadpin/ |
| A D | Kconfig | 9 enabled, any files that come from other filesystems will be 26 bool "Allow reading files from certain other filesystems that use dm-verity"
|
| /security/smack/ |
| A D | Kconfig | 13 of other mandatory security schemes. 31 "permissive" mode of other systems.
|
| A D | smack_lsm.c | 3836 struct sock *other, struct sock *newsk) in smack_unix_stream_connect() argument 3841 struct socket_smack *osp = smack_sock(other); in smack_unix_stream_connect() 3854 smk_ad_setfield_u_net_sk(&ad, other); in smack_unix_stream_connect() 3892 static int smack_unix_may_send(struct socket *sock, struct socket *other) in smack_unix_may_send() argument 3895 struct socket_smack *osp = smack_sock(other->sk); in smack_unix_may_send() 3903 smk_ad_setfield_u_net_sk(&ad, other->sk); in smack_unix_may_send()
|
| /security/yama/ |
| A D | Kconfig | 10 Like capabilities, this security module stacks with other LSMs.
|
| /security/keys/trusted-keys/ |
| A D | Kconfig | 20 The TPM only unseals the keys, if the boot PCRs and other
|
| /security/lockdown/ |
| A D | Kconfig | 17 unconditionally be called before any other LSMs.
|
| /security/integrity/ |
| A D | Kconfig | 86 other MOK keys load into the platform keyring.
|
| /security/apparmor/ |
| A D | Kconfig | 34 function entry preconditions but also exist at other key
|
| /security/integrity/ima/ |
| A D | Kconfig | 20 values of executables and other sensitive system files, 271 revoked IMA keys. It is consulted before any other keyring. If
|
| /security/ |
| A D | Kconfig.hardening | 105 sees a 1% slowdown, other systems and workloads may vary and you 134 the lowest border of the kernel stack (and for some other purposes).
|
| A D | security.c | 4537 int security_unix_stream_connect(struct sock *sock, struct sock *other, in security_unix_stream_connect() argument 4540 return call_int_hook(unix_stream_connect, sock, other, newsk); in security_unix_stream_connect() 4564 int security_unix_may_send(struct socket *sock, struct socket *other) in security_unix_may_send() argument 4566 return call_int_hook(unix_may_send, sock, other); in security_unix_may_send()
|
| A D | Kconfig | 183 On arm and other archs it should not be higher than 32768.
|
| /security/selinux/ |
| A D | hooks.c | 5172 struct sock *other, in selinux_socket_unix_stream_connect() argument 5176 struct sk_security_struct *sksec_other = selinux_sock(other); in selinux_socket_unix_stream_connect() 5182 ad_net_init_from_sk(&ad, &net, other); in selinux_socket_unix_stream_connect() 5204 struct socket *other) in selinux_socket_unix_may_send() argument 5207 struct sk_security_struct *osec = selinux_sock(other->sk); in selinux_socket_unix_may_send() 5211 ad_net_init_from_sk(&ad, &net, other->sk); in selinux_socket_unix_may_send()
|
Completed in 49 milliseconds