Searched refs:to (Results 1 - 5 of 5) sorted by relevance
/security/ |
H A D | Kconfig | 10 bool "Restrict unprivileged access to the kernel syslog" 17 unless the dmesg_restrict sysctl is explicitly set to (1). 19 If you are unsure how to answer this question, answer N. 25 This allows you to choose different security modules to be 31 If you are unsure how to answer this question, answer N. 40 If you are unsure how to answer this question, answer N. 47 If enabled, a security module can use these hooks to 49 If you are unsure how to answer this question, answer N. 56 If enabled, a security module can use these hooks to [all...] |
H A D | security.c | 91 * @ops: a pointer to the struct security_operations that is to be checked. 94 * to avoid security registration races. This method may also be used 95 * to check if your LSM is currently loaded during kernel initialization. 110 * @ops: a pointer to the struct security_options that is to be registered 112 * This function allows a security module to register itself with the 114 * value passed to this function. You'll need to check first if your LSM 115 * is allowed to registe 143 security_binder_transaction(struct task_struct *from, struct task_struct *to) argument 148 security_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 153 security_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument [all...] |
H A D | capability.c | 20 static int cap_binder_transaction(struct task_struct *from, struct task_struct *to) argument 25 static int cap_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 30 static int cap_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument 946 pr_debug("Had to override the " #function \
|
/security/keys/ |
H A D | Kconfig | 18 to five standard keyrings: UID-specific, GID-specific, session, 21 If you are unsure as to whether this is required, answer N. 34 LSMs gets to rule on which admin-level processes get to access the 46 (for example Kerberos ticket caches). The data may be stored out to 49 If you are unsure as to whether this is required, answer N. 64 If you are unsure as to whether this is required, answer N. 82 If you are unsure as to whether this is required, answer N. 93 permission to the reading process whether or not it possesses them. 95 filter out keys that the current process is not authorised to vie [all...] |
/security/selinux/ |
H A D | hooks.c | 134 * selinux_secmark_enabled - Check to see if SECMARK is currently enabled 137 * This function checks the SECMARK reference counter to see if any SECMARK 139 * zero SECMARK is considered to be enabled. Returns true (1) if SECMARK is 150 * selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled 185 panic("SELinux: Failed to initialize initial task.\n"); 267 * a call to selinux_inode_permission() can be made 327 /* The file system's label must be initialized prior to use. */ 428 assigned xattr values to the filesystem. */ 465 inodes created prior to initial policy load or inodes created 492 * This function should allow an FS to as 1938 selinux_binder_transaction(struct task_struct *from, struct task_struct *to) argument 1954 selinux_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument 1961 selinux_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument 2497 take_option(char **to, char *from, int *first, int len) argument 2508 take_selinux_option(char **to, char *from, int *first, int len) argument [all...] |
Completed in 85 milliseconds