/openbmc/linux/Documentation/netlabel/ |
H A D | lsm_interface.rst | 14 use of a common code base for several different packet labeling protocols. 21 Since NetLabel supports multiple different packet labeling protocols and LSMs
|
H A D | cipso_ipv4.rst | 28 configured to use CIPSO for packet labeling then a CIPSO IP option will be
|
/openbmc/linux/net/netlabel/ |
H A D | Kconfig | 12 NetLabel provides support for explicit network packet labeling
|
H A D | netlabel_domainhash.h | 6 * which network labeling protocol to use for a given domain. The NetLabel
|
H A D | netlabel_kapi.c | 1042 * Remove all the NetLabel labeling from @sk. The caller is responsible for 1066 * Examines the given sock to see if any NetLabel style labeling has been 1250 * Remove all the NetLabel labeling from @req. 1353 * Examines the given packet to see if a recognized form of packet labeling 1393 * according to the packet's labeling protocol.
|
/openbmc/linux/security/selinux/include/ |
H A D | objsec.h | 65 u32 def_sid; /* default SID for labeling */ 67 unsigned short behavior; /* labeling behavior */
|
H A D | security.h | 319 #define SECURITY_FS_USE_NONE 5 /* no labeling support */ 320 #define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */
|
/openbmc/linux/Documentation/devicetree/bindings/iio/multiplexer/ |
H A D | io-channel-mux.yaml | 40 List of strings, labeling the mux controller states. An empty
|
/openbmc/linux/security/selinux/ss/ |
H A D | constraint.h | 11 * process from labeling an object with a different user
|
H A D | policydb.h | 202 u32 behavior; /* labeling behavior for fs_use */ 293 fixed labeling behavior. */
|
/openbmc/linux/Documentation/security/ |
H A D | SCTP.rst | 302 SCTP Peer Labeling 313 1) If peer labeling is not enabled, then the peer context will always be 331 5) The NetLabel SCTP peer labeling rules apply as discussed in the following
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | Info-ZIP | 15 …srepresented as being Info-ZIP releases--including, but not limited to, labeling of the altered ve…
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | security.txt | 108 7. Enable filesystem SELinux labeling at the next reboot: 227 To remove SELinux labeling from local filesystems:
|
/openbmc/linux/security/smack/ |
H A D | smack.h | 26 * Use IPv6 port labeling if IPv6 is enabled and secmarks 224 #define MAY_TRANSMUTE 0x00001000 /* Controls directory labeling */
|
H A D | smack_access.c | 536 * If direct labeling works use it. in smack_populate_secattr() 537 * Otherwise use mapped labeling. in smack_populate_secattr()
|
/openbmc/linux/security/selinux/ |
H A D | netlabel.c | 138 * done. This is safe to call even if you are unsure if NetLabel labeling is 183 * @type: NetLabel labeling protocol type
|
H A D | hooks.c | 171 * selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled 176 * always_check_network policy capability is enabled, peer labeling 619 * labeling information. 740 * Determine the labeling behavior to use for this in selinux_set_mnt_opts() 788 * Switch to using mount point labeling behavior. in selinux_set_mnt_opts() 796 * filesystem requested native labeling. We had already in selinux_set_mnt_opts() 1326 * PID part to get a valid selinux labeling. in selinux_genfs_get_sid() 4505 * Check the various different forms of network peer labeling and determine 5616 /* we don't currently perform any NetLabel based labeling here and it in selinux_tun_dev_attach() 5618 * labeling without the support of the TUN user the resulting labeled in selinux_tun_dev_attach() [all …]
|
/openbmc/linux/drivers/usb/core/ |
H A D | usb.h | 186 /* for labeling diagnostics */
|
/openbmc/linux/include/net/ |
H A D | netlabel.h | 92 * for dealing with explicit packet labeling protocols such as CIPSO and 138 * number of categories supported by most labeling protocols it is not
|
/openbmc/linux/Documentation/hwmon/ |
H A D | sysfs-interface.rst | 24 values conversion, labeling of inputs and hiding of unused inputs. 30 will have to implement conversion, labeling and hiding of inputs. For
|
/openbmc/linux/scripts/selinux/mdp/ |
H A D | mdp.c | 236 * we list the filesystem types for which per-file labeling is in main()
|
/openbmc/linux/kernel/sched/ |
H A D | pelt.c | 177 * = u_0 + u_1*y + u_2*y^2 + ... [re-labeling u_i --> u_{i+1}]
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 314 is dangerous and can ruin the proper labeling of your system. 650 of systems that use compatible labeling schemes, and the DOI specified on the
|
/openbmc/linux/Documentation/filesystems/ |
H A D | vfat.rst | 315 a file's extended name. Think of slots as additional labeling for the
|
/openbmc/linux/security/apparmor/include/ |
H A D | label.h | 112 /* struct aa_label - lazy labeling struct
|