Searched refs:to (Results 1 - 5 of 5) sorted by relevance

/security/
H A DKconfig10 bool "Restrict unprivileged access to the kernel syslog"
17 unless the dmesg_restrict sysctl is explicitly set to (1).
19 If you are unsure how to answer this question, answer N.
25 This allows you to choose different security modules to be
31 If you are unsure how to answer this question, answer N.
40 If you are unsure how to answer this question, answer N.
47 If enabled, a security module can use these hooks to
49 If you are unsure how to answer this question, answer N.
56 If enabled, a security module can use these hooks to
[all...]
H A Dsecurity.c91 * @ops: a pointer to the struct security_operations that is to be checked.
94 * to avoid security registration races. This method may also be used
95 * to check if your LSM is currently loaded during kernel initialization.
110 * @ops: a pointer to the struct security_options that is to be registered
112 * This function allows a security module to register itself with the
114 * value passed to this function. You'll need to check first if your LSM
115 * is allowed to registe
143 security_binder_transaction(struct task_struct *from, struct task_struct *to) argument
148 security_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
153 security_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
[all...]
H A Dcapability.c20 static int cap_binder_transaction(struct task_struct *from, struct task_struct *to) argument
25 static int cap_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
30 static int cap_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
946 pr_debug("Had to override the " #function \
/security/keys/
H A DKconfig18 to five standard keyrings: UID-specific, GID-specific, session,
21 If you are unsure as to whether this is required, answer N.
34 LSMs gets to rule on which admin-level processes get to access the
46 (for example Kerberos ticket caches). The data may be stored out to
49 If you are unsure as to whether this is required, answer N.
64 If you are unsure as to whether this is required, answer N.
82 If you are unsure as to whether this is required, answer N.
93 permission to the reading process whether or not it possesses them.
95 filter out keys that the current process is not authorised to vie
[all...]
/security/selinux/
H A Dhooks.c134 * selinux_secmark_enabled - Check to see if SECMARK is currently enabled
137 * This function checks the SECMARK reference counter to see if any SECMARK
139 * zero SECMARK is considered to be enabled. Returns true (1) if SECMARK is
150 * selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled
185 panic("SELinux: Failed to initialize initial task.\n");
267 * a call to selinux_inode_permission() can be made
327 /* The file system's label must be initialized prior to use. */
428 assigned xattr values to the filesystem. */
465 inodes created prior to initial policy load or inodes created
492 * This function should allow an FS to as
1938 selinux_binder_transaction(struct task_struct *from, struct task_struct *to) argument
1954 selinux_binder_transfer_binder(struct task_struct *from, struct task_struct *to) argument
1961 selinux_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) argument
2497 take_option(char **to, char *from, int *first, int len) argument
2508 take_selinux_option(char **to, char *from, int *first, int len) argument
[all...]

Completed in 85 milliseconds