Home
last modified time | relevance | path

Searched refs:this (Results 1 – 16 of 16) sorted by relevance

/security/selinux/
DKconfig10 If you are unsure how to answer this question, answer N.
18 to be disabled at boot. If this option is selected, SELinux
20 command line. The purpose of this option is to allow a single
24 If you are unsure how to answer this question, answer N.
40 NOTE: selecting this option will disable the '__ro_after_init'
42 using the selinux=0 boot parameter instead of enabling this
45 If you are unsure how to answer this question, answer N.
54 policies. If unsure, say Y. With this option enabled, the
79 mmap and mprotect calls. If this option is set to 0 (zero),
81 by the kernel. If this option is set to 1 (one), SELinux will
[all …]
Dnetif.c250 static int sel_netif_netdev_notifier_handler(struct notifier_block *this, in sel_netif_netdev_notifier_handler() argument
Dhooks.c1325 #error New address family defined, please update this function. in socket_type_to_security_class()
/security/
DKconfig17 If this option is not selected, no restrictions will be enforced
20 If you are unsure how to answer this question, answer N.
30 If this option is not selected, the default Linux security
33 If you are unsure how to answer this question, answer N.
46 If you are unsure how to answer this question, answer N.
55 If you are unsure how to answer this question, answer N.
75 If you are unsure how to answer this question, answer N.
88 If you are unsure how to answer this question, answer N.
97 If you are unsure how to answer this question, answer N.
106 of the kernel. If the system does not support Intel(R) TXT, this
[all …]
DKconfig.hardening8 stack variable initializations, this warning is silenced for
11 the initialization. As this regularly leads to exploitable
12 flaws, this plugin is available to identify and zero-initialize
74 As a side-effect, this keeps a lot of variables on the
76 this with CONFIG_KASAN_STACK can lead to a stack overflow
111 by the plugin, this can produce false positive warnings.
131 are advised to test this feature on your expected workload before
147 a stack frame size greater than or equal to this parameter.
155 If this is set, STACKLEAK metrics for every task are available in
158 previous syscalls. Although this information is not precise, it
Ddevice_cgroup.c517 struct list_head *this, *tmp; in revalidate_active_exceptions() local
519 list_for_each_safe(this, tmp, &devcg->exceptions) { in revalidate_active_exceptions()
520 ex = container_of(this, struct dev_exception_item, list); in revalidate_active_exceptions()
/security/tomoyo/
DKconfig16 If you are unsure how to answer this question, answer N.
40 If you don't need audit logs, you may set this value to 0.
65 activation. You can override this setting via TOMOYO_loader= kernel
75 You can override this setting via TOMOYO_trigger= kernel command line
85 Enabling this option forces minimal built-in policy and disables
87 this option only if this kernel is built for doing fuzzing tests.
/security/smack/
DKconfig14 If you are unsure how to answer this question, answer N.
32 If you are unsure how to answer this question, answer N.
43 If you are unsure how to answer this question, answer N.
51 receiving process. If this option is selected, the delivery
55 If you are unsure how to answer this question, answer N.
/security/yama/
DKconfig10 Like capabilities, this security module stacks with other LSMs.
14 If you are unsure how to answer this question, answer N.
/security/apparmor/
Dlabel.c649 struct aa_label *this = rb_entry(*new, struct aa_label, node); in __label_insert() local
650 int result = label_cmp(label, this); in __label_insert()
659 if (!replace && !label_is_stale(this)) { in __label_insert()
660 if (__aa_get_label(this)) in __label_insert()
661 return this; in __label_insert()
663 __proxy_share(this, label); in __label_insert()
664 AA_BUG(!__label_replace(this, label)); in __label_insert()
702 struct aa_label *this = rb_entry(node, struct aa_label, node); in __vec_find() local
703 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find()
710 return __aa_get_label(this); in __vec_find()
[all …]
DKconfig16 If you are unsure how to answer this question, answer N.
/security/keys/
DKconfig22 If you are unsure as to whether this is required, answer N.
75 If you are unsure as to whether this is required, answer N.
91 If you are unsure as to whether this is required, answer N.
109 If you are unsure as to whether this is required, answer N.
122 If you are unsure as to whether this is required, answer N.
/security/integrity/evm/
DKconfig14 If you are unsure how to answer this question, answer N.
39 in the HMAC calculation, enabling this option includes newly defined
54 When this option is enabled, root can add additional xattrs to the
/security/integrity/ima/
DKconfig26 an aggregate integrity value over this list inside the
60 Disabling this option will disregard LSM based policy rules.
180 Depending on the rules configured, this policy may require kernel
191 including the regulatory.db. If both this option and
200 Enabling this rule will require all kexec'ed kernel images to
205 kexec_load syscall. Enabling this rule will prevent its
213 Enabling this rule will require all kernel modules to be signed
217 via the finit_module syscall. Enabling this rule will prevent
225 Enabling this rule will require the IMA policy to be signed and
/security/safesetid/
DKconfig15 If you are unsure how to answer this question, answer N.
/security/integrity/
DKconfig80 In addition to enabling integrity auditing support, this