Home
last modified time | relevance | path

Searched full:labeling (Results 1 – 25 of 45) sorted by relevance

12

/openbmc/linux/Documentation/netlabel/
H A Dlsm_interface.rst14 use of a common code base for several different packet labeling protocols.
21 Since NetLabel supports multiple different packet labeling protocols and LSMs
H A Dcipso_ipv4.rst28 configured to use CIPSO for packet labeling then a CIPSO IP option will be
/openbmc/linux/net/netlabel/
H A DKconfig12 NetLabel provides support for explicit network packet labeling
H A Dnetlabel_domainhash.h6 * which network labeling protocol to use for a given domain. The NetLabel
H A Dnetlabel_kapi.c1042 * Remove all the NetLabel labeling from @sk. The caller is responsible for
1066 * Examines the given sock to see if any NetLabel style labeling has been
1250 * Remove all the NetLabel labeling from @req.
1353 * Examines the given packet to see if a recognized form of packet labeling
1393 * according to the packet's labeling protocol.
/openbmc/linux/security/selinux/include/
H A Dobjsec.h65 u32 def_sid; /* default SID for labeling */
67 unsigned short behavior; /* labeling behavior */
H A Dsecurity.h319 #define SECURITY_FS_USE_NONE 5 /* no labeling support */
320 #define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */
/openbmc/linux/Documentation/devicetree/bindings/iio/multiplexer/
H A Dio-channel-mux.yaml40 List of strings, labeling the mux controller states. An empty
/openbmc/linux/security/selinux/ss/
H A Dconstraint.h11 * process from labeling an object with a different user
H A Dpolicydb.h202 u32 behavior; /* labeling behavior for fs_use */
293 fixed labeling behavior. */
/openbmc/linux/Documentation/security/
H A DSCTP.rst302 SCTP Peer Labeling
313 1) If peer labeling is not enabled, then the peer context will always be
331 5) The NetLabel SCTP peer labeling rules apply as discussed in the following
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DInfo-ZIP15 …srepresented as being Info-ZIP releases--including, but not limited to, labeling of the altered ve…
/openbmc/linux/tools/perf/Documentation/
H A Dsecurity.txt108 7. Enable filesystem SELinux labeling at the next reboot:
227 To remove SELinux labeling from local filesystems:
/openbmc/linux/security/smack/
H A Dsmack.h26 * Use IPv6 port labeling if IPv6 is enabled and secmarks
224 #define MAY_TRANSMUTE 0x00001000 /* Controls directory labeling */
H A Dsmack_access.c536 * If direct labeling works use it. in smack_populate_secattr()
537 * Otherwise use mapped labeling. in smack_populate_secattr()
/openbmc/linux/security/selinux/
H A Dnetlabel.c138 * done. This is safe to call even if you are unsure if NetLabel labeling is
183 * @type: NetLabel labeling protocol type
H A Dhooks.c171 * selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled
176 * always_check_network policy capability is enabled, peer labeling
619 * labeling information.
740 * Determine the labeling behavior to use for this in selinux_set_mnt_opts()
788 * Switch to using mount point labeling behavior. in selinux_set_mnt_opts()
796 * filesystem requested native labeling. We had already in selinux_set_mnt_opts()
1326 * PID part to get a valid selinux labeling. in selinux_genfs_get_sid()
4505 * Check the various different forms of network peer labeling and determine
5616 /* we don't currently perform any NetLabel based labeling here and it in selinux_tun_dev_attach()
5618 * labeling without the support of the TUN user the resulting labeled in selinux_tun_dev_attach()
[all …]
/openbmc/linux/drivers/usb/core/
H A Dusb.h186 /* for labeling diagnostics */
/openbmc/linux/include/net/
H A Dnetlabel.h92 * for dealing with explicit packet labeling protocols such as CIPSO and
138 * number of categories supported by most labeling protocols it is not
/openbmc/linux/Documentation/hwmon/
H A Dsysfs-interface.rst24 values conversion, labeling of inputs and hiding of unused inputs.
30 will have to implement conversion, labeling and hiding of inputs. For
/openbmc/linux/scripts/selinux/mdp/
H A Dmdp.c236 * we list the filesystem types for which per-file labeling is in main()
/openbmc/linux/kernel/sched/
H A Dpelt.c177 * = u_0 + u_1*y + u_2*y^2 + ... [re-labeling u_i --> u_{i+1}]
/openbmc/linux/Documentation/admin-guide/LSM/
H A DSmack.rst314 is dangerous and can ruin the proper labeling of your system.
650 of systems that use compatible labeling schemes, and the DOI specified on the
/openbmc/linux/Documentation/filesystems/
H A Dvfat.rst315 a file's extended name. Think of slots as additional labeling for the
/openbmc/linux/security/apparmor/include/
H A Dlabel.h112 /* struct aa_label - lazy labeling struct

12