Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 14 of 14) sorted by relevance

/security/apparmor/
DKconfig34 is enabled by default. The generation of sha1 hashes for
39 enabled only if needed.
47 debugging logic will necessarily be enabled. A submenu will
62 bool "Debug messages enabled by default"
67 When enabled, various debug messages will be logged to
Dlsm.c1344 module_param_named(enabled, apparmor_enabled, aaintbool, 0444);
1348 unsigned long enabled; in apparmor_enabled_setup() local
1349 int error = kstrtoul(str, 0, &enabled); in apparmor_enabled_setup()
1351 apparmor_enabled = enabled ? 1 : 0; in apparmor_enabled_setup()
1770 .enabled = &apparmor_enabled,
/security/lockdown/
DKconfig16 subsystem is fully initialised. If enabled, lockdown will
30 No lockdown functionality is enabled by default. Lockdown may be
31 enabled via the kernel commandline or /sys/kernel/security/lockdown.
/security/
Dsecurity.c66 if (!lsm->enabled) in is_enabled()
69 return *lsm->enabled; in is_enabled()
75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
81 if (!lsm->enabled) { in set_enabled()
82 if (enabled) in set_enabled()
83 lsm->enabled = &lsm_enabled_true; in set_enabled()
85 lsm->enabled = &lsm_enabled_false; in set_enabled()
86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
87 if (!enabled) in set_enabled()
88 lsm->enabled = &lsm_enabled_false; in set_enabled()
[all …]
DKconfig53 If enabled, a security module can use these hooks to
73 If enabled, a security module can use these hooks to
82 If enabled, a security module can use these hooks to
95 If enabled, a security module can use these hooks to
279 string "Ordered list of enabled LSMs"
DKconfig.hardening7 While the kernel is built with warnings enabled for any missed
175 When "init_on_alloc" is enabled, all page allocator and slab
187 Similar to "init_on_alloc", when "init_on_free" is enabled,
/security/loadpin/
DKconfig9 enabled, any files that come from other filesystems will be
19 selected, it can be enabled at boot with the kernel parameter
/security/integrity/
DKconfig14 Each of these components can be enabled/disabled separately.
87 be enabled by specifying 'integrity_audit=1' on the kernel
/security/selinux/
DKconfig22 necessarily enabled.
54 policies. If unsure, say Y. With this option enabled, the
Dhooks.c130 unsigned long enabled; in selinux_enabled_setup() local
131 if (!kstrtoul(str, 0, &enabled)) in selinux_enabled_setup()
132 selinux_enabled = enabled ? 1 : 0; in selinux_enabled_setup()
7168 .enabled = &selinux_enabled,
/security/integrity/evm/
DKconfig54 When this option is enabled, root can add additional xattrs to the
/security/selinux/ss/
Davtab.c393 u16 enabled; in avtab_read_item() local
444 enabled = (val & AVTAB_ENABLED_OLD) ? AVTAB_ENABLED : 0; in avtab_read_item()
462 key.specified = spec_order[i] | enabled; in avtab_read_item()
/security/tomoyo/
Dtomoyo.c596 .enabled = &tomoyo_enabled,
/security/integrity/ima/
DKconfig192 CFG80211_REQUIRE_SIGNED_REGDB are enabled, then both signature