Searched refs:which (Results 1 – 11 of 11) sorted by relevance
/security/tomoyo/ |
D | Kconfig | 49 operations which can lead to the hijacking of the boot sequence are 51 immediately after loading the fixed part of policy which will allow 52 only operations needed for mounting a partition which contains the 64 This is the default pathname of policy loader which is called before
|
/security/integrity/ |
D | Kconfig | 8 This option enables the integrity subsystem, which is comprised 60 Provide a separate, distinct keyring for platform trusted keys, which 81 option adds a kernel parameter 'integrity_audit', which
|
/security/selinux/ |
D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 32 This option enables writing to a selinuxfs node 'disable', which 53 which is useful for experimenting with SELinux and developing 66 /selinux/avc/cache_stats, which may be monitored via
|
D | avc.c | 198 u8 perm, u8 which) in avc_xperms_has_perm() argument 202 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm() 205 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm() 208 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm() 292 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument 302 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc() 308 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc() 314 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
|
/security/keys/ |
D | Kconfig | 13 It also includes provision of methods by which such keys might be 42 filesystem in which each method needs to request an authentication 57 LSMs gets to rule on which admin-level processes get to access the 105 which are encrypted/decrypted with a 'master' symmetric key. The
|
/security/yama/ |
D | Kconfig | 7 This selects Yama, which extends DAC support with additional
|
/security/smack/ |
D | Kconfig | 27 identify which rules are necessary and what accesses
|
/security/integrity/evm/ |
D | Kconfig | 23 Default value is 'selected', which is former version 2.
|
/security/ |
D | Kconfig | 111 create a robust initial kernel measurement and verification, which 135 This is the portion of low virtual memory which should be protected 142 Programs which use vm86 functionality or have some need to map
|
D | Kconfig.hardening | 120 the stack initialized to the poison value, which both reduces 166 This option provides 'stack_erasing' sysctl, which can be used in
|
/security/integrity/ima/ |
D | Kconfig | 175 This option defines an IMA appraisal policy at build time, which 284 This option creates an IMA blacklist keyring, which contains all
|