Home
last modified time | relevance | path

Searched refs:which (Results 1 – 11 of 11) sorted by relevance

/security/tomoyo/
DKconfig49 operations which can lead to the hijacking of the boot sequence are
51 immediately after loading the fixed part of policy which will allow
52 only operations needed for mounting a partition which contains the
64 This is the default pathname of policy loader which is called before
/security/integrity/
DKconfig8 This option enables the integrity subsystem, which is comprised
60 Provide a separate, distinct keyring for platform trusted keys, which
81 option adds a kernel parameter 'integrity_audit', which
/security/selinux/
DKconfig17 This option adds a kernel parameter 'selinux', which allows SELinux
32 This option enables writing to a selinuxfs node 'disable', which
53 which is useful for experimenting with SELinux and developing
66 /selinux/avc/cache_stats, which may be monitored via
Davc.c198 u8 perm, u8 which) in avc_xperms_has_perm() argument
202 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm()
205 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm()
208 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm()
292 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument
302 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc()
308 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc()
314 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
/security/keys/
DKconfig13 It also includes provision of methods by which such keys might be
42 filesystem in which each method needs to request an authentication
57 LSMs gets to rule on which admin-level processes get to access the
105 which are encrypted/decrypted with a 'master' symmetric key. The
/security/yama/
DKconfig7 This selects Yama, which extends DAC support with additional
/security/smack/
DKconfig27 identify which rules are necessary and what accesses
/security/integrity/evm/
DKconfig23 Default value is 'selected', which is former version 2.
/security/
DKconfig111 create a robust initial kernel measurement and verification, which
135 This is the portion of low virtual memory which should be protected
142 Programs which use vm86 functionality or have some need to map
DKconfig.hardening120 the stack initialized to the poison value, which both reduces
166 This option provides 'stack_erasing' sysctl, which can be used in
/security/integrity/ima/
DKconfig175 This option defines an IMA appraisal policy at build time, which
284 This option creates an IMA blacklist keyring, which contains all