Lines Matching refs:a
53 If enabled, a security module can use these hooks to
73 If enabled, a security module can use these hooks to
82 If enabled, a security module can use these hooks to
95 If enabled, a security module can use these hooks to
105 Intel(R) Trusted Execution Technology to perform a measured launch
111 create a robust initial kernel measurement and verification, which
113 correctly. This level of protection requires a root of trust outside
124 See Documentation/x86/intel_txt.rst for a description of how to enable
125 Intel TXT support in a kernel boot.
136 from userspace allocation. Keeping a user from writing to low pages
140 a value of 65536 is reasonable and should cause no problems.
171 This is a temporary option that allows missing usercopy whitelists
172 to be discovered via a WARN() to the kernel log, instead of
185 When a multi-page allocation is done without __GFP_COMP,
199 bool "Force all usermode helper calls through a single binary"
204 either in the kernel code itself, or as a kernel configuration
208 calls through a single executable that can not have its name
255 change this choice unless you are creating a fresh kernel config,