Searched refs:bit (Results 1 – 9 of 9) sorted by relevance
| /security/selinux/ss/ |
| A D | ebitmap.h | 68 struct ebitmap_node **n, u32 bit) in ebitmap_next_positive() argument 84 #define EBITMAP_NODE_INDEX(node, bit) \ argument 86 #define EBITMAP_NODE_OFFSET(node, bit) \ argument 91 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_get_bit() 92 u32 ofs = EBITMAP_NODE_OFFSET(n, bit); in ebitmap_node_get_bit() 102 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_set_bit() 103 u32 ofs = EBITMAP_NODE_OFFSET(n, bit); in ebitmap_node_set_bit() 111 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_clr_bit() 112 u32 ofs = EBITMAP_NODE_OFFSET(n, bit); in ebitmap_node_clr_bit() 119 for ((bit) = ebitmap_start_positive(e, &(n)); \ [all …]
|
| A D | ebitmap.c | 82 u32 bit; in ebitmap_and() local 89 if (ebitmap_get_bit(e2, bit)) { in ebitmap_and() 90 rc = ebitmap_set_bit(dst, bit, 1); in ebitmap_and() 264 if (e->highbit < bit) in ebitmap_get_bit() 268 while (n && (n->startbit <= bit)) { in ebitmap_get_bit() 270 return ebitmap_node_get_bit(n, bit); in ebitmap_get_bit() 283 while (n && n->startbit <= bit) { in ebitmap_set_bit() 286 ebitmap_node_set_bit(n, bit); in ebitmap_set_bit() 290 ebitmap_node_clr_bit(n, bit); in ebitmap_set_bit() 327 new->startbit = bit - (bit % EBITMAP_SIZE); in ebitmap_set_bit() [all …]
|
| A D | policydb.c | 1695 u32 bit; in user_bounds_sanity_check() local 1705 ebitmap_for_each_positive_bit(&user->roles, node, bit) in user_bounds_sanity_check() 1707 if (ebitmap_get_bit(&upper->roles, bit)) in user_bounds_sanity_check() 1713 sym_name(p, SYM_ROLES, bit), in user_bounds_sanity_check() 1732 u32 bit; in role_bounds_sanity_check() local 1742 ebitmap_for_each_positive_bit(&role->types, node, bit) in role_bounds_sanity_check() 1744 if (ebitmap_get_bit(&upper->types, bit)) in role_bounds_sanity_check() 1750 sym_name(p, SYM_TYPES, bit), in role_bounds_sanity_check() 3556 u32 bit, len = strlen(ft->name); in filename_write_helper_compat() local 3559 ebitmap_for_each_positive_bit(&datum->stypes, node, bit) in filename_write_helper_compat() [all …]
|
| /security/landlock/ |
| A D | common.h | 20 #define BIT_INDEX(bit) HWEIGHT(bit - 1) argument
|
| /security/tomoyo/ |
| A D | common.c | 791 head->r.bit = 0; in tomoyo_read_profile() 798 const u8 i = head->r.bit; in tomoyo_read_profile() 814 head->r.bit++; in tomoyo_read_profile() 1389 u8 bit; in tomoyo_print_entry() local 1402 for (bit = 0; bit < TOMOYO_MAX_PATH_OPERATION; bit++) { in tomoyo_print_entry() 1403 if (!(perm & (1 << bit))) in tomoyo_print_entry() 1433 for (bit = 0; bit < TOMOYO_MAX_PATH2_OPERATION; bit++) { in tomoyo_print_entry() 1454 for (bit = 0; bit < TOMOYO_MAX_PATH_NUMBER_OPERATION; bit++) { in tomoyo_print_entry() 1475 for (bit = 0; bit < TOMOYO_MAX_MKDEV_OPERATION; bit++) { in tomoyo_print_entry() 1498 for (bit = 0; bit < TOMOYO_MAX_NETWORK_OPERATION; bit++) { in tomoyo_print_entry() [all …]
|
| A D | common.h | 813 u8 bit; member
|
| /security/ |
| A D | Kconfig.hardening | 60 pattern is situation-specific; Clang on 64-bit uses 0xAA 62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF 318 to keep adjacent bitfields together, but with their bit
|
| A D | Kconfig | 64 A 64-bit kernel is required for the memory sealing feature.
|
| /security/integrity/ |
| A D | Kconfig | 94 keyring that contain the CA bit set along with the keyCertSign
|
Completed in 33 milliseconds