Searched refs:enabled (Results 1 – 14 of 14) sorted by relevance
/security/apparmor/ |
D | Kconfig | 34 is enabled by default. The generation of sha1 hashes for 39 enabled only if needed. 47 debugging logic will necessarily be enabled. A submenu will 62 bool "Debug messages enabled by default" 67 When enabled, various debug messages will be logged to
|
D | lsm.c | 1344 module_param_named(enabled, apparmor_enabled, aaintbool, 0444); 1348 unsigned long enabled; in apparmor_enabled_setup() local 1349 int error = kstrtoul(str, 0, &enabled); in apparmor_enabled_setup() 1351 apparmor_enabled = enabled ? 1 : 0; in apparmor_enabled_setup() 1770 .enabled = &apparmor_enabled,
|
/security/lockdown/ |
D | Kconfig | 16 subsystem is fully initialised. If enabled, lockdown will 30 No lockdown functionality is enabled by default. Lockdown may be 31 enabled via the kernel commandline or /sys/kernel/security/lockdown.
|
/security/ |
D | security.c | 66 if (!lsm->enabled) in is_enabled() 69 return *lsm->enabled; in is_enabled() 75 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 81 if (!lsm->enabled) { in set_enabled() 82 if (enabled) in set_enabled() 83 lsm->enabled = &lsm_enabled_true; in set_enabled() 85 lsm->enabled = &lsm_enabled_false; in set_enabled() 86 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 87 if (!enabled) in set_enabled() 88 lsm->enabled = &lsm_enabled_false; in set_enabled() [all …]
|
D | Kconfig | 53 If enabled, a security module can use these hooks to 73 If enabled, a security module can use these hooks to 82 If enabled, a security module can use these hooks to 95 If enabled, a security module can use these hooks to 279 string "Ordered list of enabled LSMs"
|
D | Kconfig.hardening | 7 While the kernel is built with warnings enabled for any missed 175 When "init_on_alloc" is enabled, all page allocator and slab 187 Similar to "init_on_alloc", when "init_on_free" is enabled,
|
/security/loadpin/ |
D | Kconfig | 9 enabled, any files that come from other filesystems will be 19 selected, it can be enabled at boot with the kernel parameter
|
/security/integrity/ |
D | Kconfig | 14 Each of these components can be enabled/disabled separately. 87 be enabled by specifying 'integrity_audit=1' on the kernel
|
/security/selinux/ |
D | Kconfig | 22 necessarily enabled. 54 policies. If unsure, say Y. With this option enabled, the
|
D | hooks.c | 130 unsigned long enabled; in selinux_enabled_setup() local 131 if (!kstrtoul(str, 0, &enabled)) in selinux_enabled_setup() 132 selinux_enabled = enabled ? 1 : 0; in selinux_enabled_setup() 7168 .enabled = &selinux_enabled,
|
/security/integrity/evm/ |
D | Kconfig | 54 When this option is enabled, root can add additional xattrs to the
|
/security/selinux/ss/ |
D | avtab.c | 393 u16 enabled; in avtab_read_item() local 444 enabled = (val & AVTAB_ENABLED_OLD) ? AVTAB_ENABLED : 0; in avtab_read_item() 462 key.specified = spec_order[i] | enabled; in avtab_read_item()
|
/security/tomoyo/ |
D | tomoyo.c | 596 .enabled = &tomoyo_enabled,
|
/security/integrity/ima/ |
D | Kconfig | 192 CFG80211_REQUIRE_SIGNED_REGDB are enabled, then both signature
|