Home
last modified time | relevance | path

Searched refs:option (Results 1 – 14 of 14) sorted by relevance

/security/selinux/
DKconfig16 This option adds a kernel parameter 'selinux', which allows SELinux
17 to be disabled at boot. If this option is selected, SELinux
19 command line. The purpose of this option is to allow a single
31 This option sets the default value for the kernel parameter
33 option is set to 0 (zero), the SELinux kernel parameter will
34 default to 0, disabling SELinux at bootup. If this option is
45 This option enables writing to a selinuxfs node 'disable', which
48 This option is similar to the selinux=0 boot parameter, but is to
60 This enables the development support option of NSA SELinux,
62 policies. If unsure, say Y. With this option enabled, the
[all …]
Dhooks.c2500 static inline int match_prefix(char *prefix, int plen, char *option, int olen) in match_prefix() argument
2505 return !memcmp(prefix, option, plen); in match_prefix()
2508 static inline int selinux_option(char *option, int len) in selinux_option() argument
2510 return (match_prefix(CONTEXT_STR, sizeof(CONTEXT_STR)-1, option, len) || in selinux_option()
2511 match_prefix(FSCONTEXT_STR, sizeof(FSCONTEXT_STR)-1, option, len) || in selinux_option()
2512 match_prefix(DEFCONTEXT_STR, sizeof(DEFCONTEXT_STR)-1, option, len) || in selinux_option()
2513 match_prefix(ROOTCONTEXT_STR, sizeof(ROOTCONTEXT_STR)-1, option, len) || in selinux_option()
2514 match_prefix(LABELSUPP_STR, sizeof(LABELSUPP_STR)-1, option, len)); in selinux_option()
/security/apparmor/
DKconfig23 This option sets the default value for the kernel parameter
25 at boot. If this option is set to 0 (zero), the AppArmor
27 boot. If this option is set to 1 (one), the AppArmor
41 This option selects whether sha1 hashing is done against loaded
/security/integrity/
DKconfig7 This option enables the integrity subsystem, which is comprised
24 This option enables digital signature verification support
41 This option enables digital signature verification using
50 option adds a kernel parameter 'integrity_audit', which
/security/integrity/ima/
DKconfig46 Disabling this option will disregard LSM based policy rules.
84 line 'ima_hash=' option.
116 This option enables local measurement integrity appraisal.
132 This option requires that all keys added to the .ima
143 .system keyring. This option enables X509 certificate
151 This option defines IMA X509 certificate path.
158 This option requires user-space init to be signed.
/security/tomoyo/
DKconfig47 policy was loaded. This option will be useful for systems where
65 command line option.
75 option. For example, if you pass init=/bin/systemd option, you may
76 want to also pass TOMOYO_trigger=/bin/systemd option.
/security/keys/
DKconfig9 This option provides support for retaining authentication tokens and
31 This option provides a register of persistent per-UID keyrings,
49 This option provides support for holding large keys within the kernel
62 This option provides support for creating, sealing, and unsealing
80 This option provides support for create/encrypting/decrypting keys
Dcompat.c59 COMPAT_SYSCALL_DEFINE5(keyctl, u32, option, in COMPAT_SYSCALL_DEFINE5() argument
62 switch (option) { in COMPAT_SYSCALL_DEFINE5()
Dkeyctl.c1559 SYSCALL_DEFINE5(keyctl, int, option, unsigned long, arg2, unsigned long, arg3, in SYSCALL_DEFINE5() argument
1562 switch (option) { in SYSCALL_DEFINE5()
/security/yama/
Dyama_lsm.c154 int yama_task_prctl(int option, unsigned long arg2, unsigned long arg3, in yama_task_prctl() argument
160 switch (option) { in yama_task_prctl()
/security/
DKconfig16 If this option is not selected, no restrictions will be enforced
38 If this option is not selected, the default Linux security
97 This option enables support for booting the kernel with the
161 This option checks for obviously wrong memory regions when
Dcommoncap.c909 int cap_task_prctl(int option, unsigned long arg2, unsigned long arg3, in cap_task_prctl() argument
915 switch (option) { in cap_task_prctl()
Dsecurity.c996 int security_task_prctl(int option, unsigned long arg2, unsigned long arg3, in security_task_prctl() argument
1004 thisrc = hp->hook.task_prctl(option, arg2, arg3, arg4, arg5); in security_task_prctl()
/security/integrity/evm/
DKconfig37 in the HMAC calculation, enabling this option includes newly defined