Searched refs:set (Results 1 – 18 of 18) sorted by relevance
| /security/smack/ |
| A D | Kconfig | 24 intention is that a process can be granted a wide set 25 of access initially with the bringup mode set on the 29 access rule set once the behavior is well understood.
|
| /security/apparmor/ |
| A D | label.c | 506 struct aa_label *set, in __aa_label_next_not_in_set() argument 509 AA_BUG(!set); in __aa_label_next_not_in_set() 512 AA_BUG(I->i > set->size); in __aa_label_next_not_in_set() 517 while (I->j < sub->size && I->i < set->size) { in __aa_label_next_not_in_set() 518 int res = profile_cmp(sub->vec[I->j], set->vec[I->i]); in __aa_label_next_not_in_set() 547 AA_BUG(!set); in aa_label_is_subset() 550 if (sub == set) in aa_label_is_subset() 553 return __aa_label_next_not_in_set(&i, set, sub) == NULL; in aa_label_is_subset() 575 AA_BUG(!set); in aa_label_is_unconfined_subset() 578 if (sub == set) in aa_label_is_unconfined_subset() [all …]
|
| A D | lsm.c | 1787 .set = param_set_aabool, 1795 .set = param_set_aauint, 1805 .set = param_set_aacompressionlevel, 1814 .set = param_set_aalockpolicy, 1898 .set = param_set_aaintbool,
|
| /security/integrity/ |
| A D | Kconfig | 72 If set, provide a keyring to which Machine Owner Keys (MOK) may 89 bool "Only CA keys without DigitialSignature usage set" 94 keyring that contain the CA bit set along with the keyCertSign
|
| /security/safesetid/ |
| A D | Kconfig | 12 with CAP_SET{U/G}ID, such as allowing a user to set up user namespace
|
| /security/selinux/ss/ |
| A D | sidtab.c | 42 s->isids[i].set = 0; in sidtab_init() 96 isid->set = 1; in sidtab_set_initial() 238 return s->isids[sid - 1].set ? &s->isids[sid - 1].entry : NULL; in sidtab_lookup_initial() 546 if (s->isids[i].set) in sidtab_destroy()
|
| A D | avtab.c | 352 unsigned int set, vers = pol->policyvers; in avtab_read_item() local 447 set = hweight16(key.specified & (AVTAB_XPERMS | AVTAB_TYPE | AVTAB_AV)); in avtab_read_item() 448 if (!set || set > 1) { in avtab_read_item()
|
| A D | sidtab.h | 65 int set; member
|
| /security/apparmor/include/ |
| A D | label.h | 271 bool aa_label_is_subset(struct aa_label *set, struct aa_label *sub); 272 bool aa_label_is_unconfined_subset(struct aa_label *set, struct aa_label *sub); 274 struct aa_label *set,
|
| /security/landlock/ |
| A D | Kconfig | 12 set of access rights (e.g. open a file in read-only, make a
|
| /security/integrity/evm/ |
| A D | Kconfig | 69 key must have digitalSignature usage set.
|
| /security/ |
| A D | Kconfig | 18 unless the dmesg_restrict sysctl is explicitly set to (1). 207 disabled, choose this option and then set 248 for this choice will be ignored after CONFIG_LSM has been set.
|
| A D | Kconfig.hardening | 144 If this is set, KSTACK_ERASE metrics for every task are available
|
| /security/keys/ |
| A D | keyctl.c | 1412 goto set; in keyctl_set_reqkey_keyring() 1418 goto set; in keyctl_set_reqkey_keyring() 1425 goto set; in keyctl_set_reqkey_keyring() 1434 set: in keyctl_set_reqkey_keyring()
|
| A D | Kconfig | 57 removed if they expire (a default timeout is set upon creation).
|
| /security/tomoyo/ |
| A D | Kconfig | 38 If you don't need audit logs, you may set this value to 0.
|
| /security/integrity/ima/ |
| A D | Kconfig | 257 key must also have the digitalSignature usage set. 332 If set to the default value of 0, an extra half page of memory for those
|
| A D | ima_crypto.c | 49 .set = param_set_bufsize,
|
Completed in 31 milliseconds