Home
last modified time | relevance | path

Searched refs:A (Results 1 – 13 of 13) sorted by relevance

/security/apparmor/include/
A Daf_unix.h20 #define unix_addr(A) ((struct sockaddr_un *)(A)) argument
24 #define is_unix_addr_anon(A, L) ((A) && unix_addr_len(L) <= 0) argument
25 #define is_unix_addr_fs(A, L) (!is_unix_addr_anon(A, L) && \ argument
26 !is_unix_addr_abstract_name(unix_addr(A)->sun_path))
A Dpolicy.h267 #define name_is_shared(A, B) ((A)->hname && (A)->hname == (B)->hname) argument
A Dlabel.h186 #define label_for_each_in_merge(I, A, B, P) \ argument
188 ((P) = aa_label_next_in_merge(&(I), (A), (B))); \
/security/landlock/
A DKconfig11 tailored access control policies. A Landlock security policy is a
/security/loadpin/
A DKconfig31 digests it considers trusted. A verity backed filesystem is
/security/integrity/evm/
A DKconfig67 onto the '.evm' trusted keyring. A public key can be used to
/security/ipe/
A DKconfig19 control. A key feature of IPE is a customizable policy to allow
/security/keys/
A Dkeyring.c1216 static int keyring_detect_cycle(struct key *A, struct key *B) in keyring_detect_cycle() argument
1219 .index_key = A->index_key, in keyring_detect_cycle()
1220 .match_data.raw_data = A, in keyring_detect_cycle()
A DKconfig51 A particular keyring may be accessed by either the user whose keyring
/security/apparmor/
A DKconfig24 debugging logic will necessarily be enabled. A submenu will
/security/
A DKconfig64 A 64-bit kernel is required for the memory sealing feature.
278 A comma-separated list of LSMs, in initialization order.
/security/smack/
A Dsmack_lsm.c72 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s} macro
79 A(fsdefault), A(fsfloor), A(fshat), A(fsroot), A(fstransmute)
81 #undef A
/security/selinux/
A Dhooks.c400 #define A(s, has_arg) {#s, sizeof(#s) - 1, Opt_##s, has_arg} macro
407 A(context, true),
408 A(fscontext, true),
409 A(defcontext, true),
410 A(rootcontext, true),
411 A(seclabel, false),
413 #undef A

Completed in 42 milliseconds