Searched refs:A (Results 1 – 10 of 10) sorted by relevance
/security/apparmor/include/ |
D | policy.h | 172 #define name_is_shared(A, B) ((A)->hname && (A)->hname == (B)->hname) argument
|
D | label.h | 196 #define label_for_each_in_merge(I, A, B, P) \ argument 198 ((P) = aa_label_next_in_merge(&(I), (A), (B))); \
|
/security/landlock/ |
D | Kconfig | 10 tailored access control policies. A Landlock security policy is a
|
/security/integrity/evm/ |
D | Kconfig | 66 onto the '.evm' trusted keyring. A public key can be used to
|
/security/apparmor/ |
D | Kconfig | 49 debugging logic will necessarily be enabled. A submenu will
|
/security/keys/ |
D | keyring.c | 1213 static int keyring_detect_cycle(struct key *A, struct key *B) in keyring_detect_cycle() argument 1216 .index_key = A->index_key, in keyring_detect_cycle() 1217 .match_data.raw_data = A, in keyring_detect_cycle()
|
D | Kconfig | 51 A particular keyring may be accessed by either the user whose keyring
|
/security/smack/ |
D | smack_lsm.c | 59 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s} macro 66 A(fsdefault), A(fsfloor), A(fshat), A(fsroot), A(fstransmute) 68 #undef A
|
/security/ |
D | Kconfig | 279 A comma-separated list of LSMs, in initialization order.
|
/security/selinux/ |
D | hooks.c | 383 #define A(s, has_arg) {#s, sizeof(#s) - 1, Opt_##s, has_arg} macro 390 A(context, true), 391 A(fscontext, true), 392 A(defcontext, true), 393 A(rootcontext, true), 394 A(seclabel, false), 396 #undef A
|