Searched refs:A (Results 1 – 13 of 13) sorted by relevance
| /security/apparmor/include/ |
| A D | af_unix.h | 20 #define unix_addr(A) ((struct sockaddr_un *)(A)) argument 24 #define is_unix_addr_anon(A, L) ((A) && unix_addr_len(L) <= 0) argument 25 #define is_unix_addr_fs(A, L) (!is_unix_addr_anon(A, L) && \ argument 26 !is_unix_addr_abstract_name(unix_addr(A)->sun_path))
|
| A D | policy.h | 267 #define name_is_shared(A, B) ((A)->hname && (A)->hname == (B)->hname) argument
|
| A D | label.h | 186 #define label_for_each_in_merge(I, A, B, P) \ argument 188 ((P) = aa_label_next_in_merge(&(I), (A), (B))); \
|
| /security/landlock/ |
| A D | Kconfig | 11 tailored access control policies. A Landlock security policy is a
|
| /security/loadpin/ |
| A D | Kconfig | 31 digests it considers trusted. A verity backed filesystem is
|
| /security/integrity/evm/ |
| A D | Kconfig | 67 onto the '.evm' trusted keyring. A public key can be used to
|
| /security/ipe/ |
| A D | Kconfig | 19 control. A key feature of IPE is a customizable policy to allow
|
| /security/keys/ |
| A D | keyring.c | 1216 static int keyring_detect_cycle(struct key *A, struct key *B) in keyring_detect_cycle() argument 1219 .index_key = A->index_key, in keyring_detect_cycle() 1220 .match_data.raw_data = A, in keyring_detect_cycle()
|
| A D | Kconfig | 51 A particular keyring may be accessed by either the user whose keyring
|
| /security/apparmor/ |
| A D | Kconfig | 24 debugging logic will necessarily be enabled. A submenu will
|
| /security/ |
| A D | Kconfig | 64 A 64-bit kernel is required for the memory sealing feature. 278 A comma-separated list of LSMs, in initialization order.
|
| /security/smack/ |
| A D | smack_lsm.c | 72 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s} macro 79 A(fsdefault), A(fsfloor), A(fshat), A(fsroot), A(fstransmute) 81 #undef A
|
| /security/selinux/ |
| A D | hooks.c | 400 #define A(s, has_arg) {#s, sizeof(#s) - 1, Opt_##s, has_arg} macro 407 A(context, true), 408 A(fscontext, true), 409 A(defcontext, true), 410 A(rootcontext, true), 411 A(seclabel, false), 413 #undef A
|
Completed in 42 milliseconds