Searched refs:this (Results 1 – 16 of 16) sorted by relevance
/security/selinux/ |
D | Kconfig | 10 If you are unsure how to answer this question, answer N. 18 to be disabled at boot. If this option is selected, SELinux 20 command line. The purpose of this option is to allow a single 24 If you are unsure how to answer this question, answer N. 40 NOTE: selecting this option will disable the '__ro_after_init' 42 using the selinux=0 boot parameter instead of enabling this 45 If you are unsure how to answer this question, answer N. 54 policies. If unsure, say Y. With this option enabled, the 79 mmap and mprotect calls. If this option is set to 0 (zero), 81 by the kernel. If this option is set to 1 (one), SELinux will [all …]
|
D | netif.c | 250 static int sel_netif_netdev_notifier_handler(struct notifier_block *this, in sel_netif_netdev_notifier_handler() argument
|
D | hooks.c | 1325 #error New address family defined, please update this function. in socket_type_to_security_class()
|
/security/ |
D | Kconfig | 17 If this option is not selected, no restrictions will be enforced 20 If you are unsure how to answer this question, answer N. 30 If this option is not selected, the default Linux security 33 If you are unsure how to answer this question, answer N. 46 If you are unsure how to answer this question, answer N. 55 If you are unsure how to answer this question, answer N. 75 If you are unsure how to answer this question, answer N. 88 If you are unsure how to answer this question, answer N. 97 If you are unsure how to answer this question, answer N. 106 of the kernel. If the system does not support Intel(R) TXT, this [all …]
|
D | Kconfig.hardening | 8 stack variable initializations, this warning is silenced for 11 the initialization. As this regularly leads to exploitable 12 flaws, this plugin is available to identify and zero-initialize 74 As a side-effect, this keeps a lot of variables on the 76 this with CONFIG_KASAN_STACK can lead to a stack overflow 111 by the plugin, this can produce false positive warnings. 131 are advised to test this feature on your expected workload before 147 a stack frame size greater than or equal to this parameter. 155 If this is set, STACKLEAK metrics for every task are available in 158 previous syscalls. Although this information is not precise, it
|
D | device_cgroup.c | 517 struct list_head *this, *tmp; in revalidate_active_exceptions() local 519 list_for_each_safe(this, tmp, &devcg->exceptions) { in revalidate_active_exceptions() 520 ex = container_of(this, struct dev_exception_item, list); in revalidate_active_exceptions()
|
/security/tomoyo/ |
D | Kconfig | 16 If you are unsure how to answer this question, answer N. 40 If you don't need audit logs, you may set this value to 0. 65 activation. You can override this setting via TOMOYO_loader= kernel 75 You can override this setting via TOMOYO_trigger= kernel command line 85 Enabling this option forces minimal built-in policy and disables 87 this option only if this kernel is built for doing fuzzing tests.
|
/security/smack/ |
D | Kconfig | 14 If you are unsure how to answer this question, answer N. 32 If you are unsure how to answer this question, answer N. 43 If you are unsure how to answer this question, answer N. 51 receiving process. If this option is selected, the delivery 55 If you are unsure how to answer this question, answer N.
|
/security/yama/ |
D | Kconfig | 10 Like capabilities, this security module stacks with other LSMs. 14 If you are unsure how to answer this question, answer N.
|
/security/apparmor/ |
D | label.c | 649 struct aa_label *this = rb_entry(*new, struct aa_label, node); in __label_insert() local 650 int result = label_cmp(label, this); in __label_insert() 659 if (!replace && !label_is_stale(this)) { in __label_insert() 660 if (__aa_get_label(this)) in __label_insert() 661 return this; in __label_insert() 663 __proxy_share(this, label); in __label_insert() 664 AA_BUG(!__label_replace(this, label)); in __label_insert() 702 struct aa_label *this = rb_entry(node, struct aa_label, node); in __vec_find() local 703 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find() 710 return __aa_get_label(this); in __vec_find() [all …]
|
D | Kconfig | 16 If you are unsure how to answer this question, answer N.
|
/security/keys/ |
D | Kconfig | 22 If you are unsure as to whether this is required, answer N. 75 If you are unsure as to whether this is required, answer N. 91 If you are unsure as to whether this is required, answer N. 109 If you are unsure as to whether this is required, answer N. 122 If you are unsure as to whether this is required, answer N.
|
/security/integrity/evm/ |
D | Kconfig | 14 If you are unsure how to answer this question, answer N. 39 in the HMAC calculation, enabling this option includes newly defined 54 When this option is enabled, root can add additional xattrs to the
|
/security/integrity/ima/ |
D | Kconfig | 26 an aggregate integrity value over this list inside the 60 Disabling this option will disregard LSM based policy rules. 180 Depending on the rules configured, this policy may require kernel 191 including the regulatory.db. If both this option and 200 Enabling this rule will require all kexec'ed kernel images to 205 kexec_load syscall. Enabling this rule will prevent its 213 Enabling this rule will require all kernel modules to be signed 217 via the finit_module syscall. Enabling this rule will prevent 225 Enabling this rule will require the IMA policy to be signed and
|
/security/safesetid/ |
D | Kconfig | 15 If you are unsure how to answer this question, answer N.
|
/security/integrity/ |
D | Kconfig | 80 In addition to enabling integrity auditing support, this
|