Searched refs:enabled (Results 1 – 18 of 18) sorted by relevance
/security/integrity/evm/ |
D | evm_main.c | 41 .enabled = true 46 .enabled = true 51 .enabled = true 56 .enabled = true 61 .enabled = true 66 .enabled = true 71 .enabled = true 75 .enabled = true 102 !evm_config_default_xattrnames[i].enabled ? in evm_init_config() 295 if (!all_xattrs && !xattr->enabled) in evm_protected_xattr_common()
|
D | evm_secfs.c | 143 if (!xattr->enabled) in evm_read_xattrs() 156 if (!xattr->enabled) in evm_read_xattrs() 209 xattr->enabled = true; in evm_write_xattrs() 256 if (!tmp->enabled) { in evm_write_xattrs() 257 tmp->enabled = true; in evm_write_xattrs()
|
D | evm.h | 32 bool enabled; member
|
D | Kconfig | 54 When this option is enabled, root can add additional xattrs to the
|
D | evm_crypto.c | 246 if (type != EVM_XATTR_PORTABLE_DIGSIG && !xattr->enabled) in evm_calc_hmac_or_hash()
|
/security/apparmor/ |
D | Kconfig | 36 is enabled by default. The generation of sha1 hashes for 41 enabled only if needed. 49 debugging logic will necessarily be enabled. A submenu will 64 bool "Debug messages enabled by default" 69 When enabled, various debug messages will be logged to
|
D | lsm.c | 1387 module_param_named(enabled, apparmor_enabled, aaintbool, 0444); 1391 unsigned long enabled; in apparmor_enabled_setup() local 1392 int error = kstrtoul(str, 0, &enabled); in apparmor_enabled_setup() 1394 apparmor_enabled = enabled ? 1 : 0; in apparmor_enabled_setup() 1909 .enabled = &apparmor_enabled,
|
/security/lockdown/ |
D | Kconfig | 16 subsystem is fully initialised. If enabled, lockdown will 30 No lockdown functionality is enabled by default. Lockdown may be 31 enabled via the kernel commandline or /sys/kernel/security/lockdown.
|
/security/loadpin/ |
D | Kconfig | 9 enabled, any files that come from other filesystems will be 19 selected, it can be enabled at boot with the kernel parameter
|
/security/ |
D | security.c | 103 if (!lsm->enabled) in is_enabled() 106 return *lsm->enabled; in is_enabled() 112 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument 118 if (!lsm->enabled) { in set_enabled() 119 if (enabled) in set_enabled() 120 lsm->enabled = &lsm_enabled_true; in set_enabled() 122 lsm->enabled = &lsm_enabled_false; in set_enabled() 123 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled() 124 if (!enabled) in set_enabled() 125 lsm->enabled = &lsm_enabled_false; in set_enabled() [all …]
|
D | Kconfig | 53 If enabled, a security module can use these hooks to 62 If enabled, a security module can use these hooks to 71 If enabled, a security module can use these hooks to 84 If enabled, a security module can use these hooks to 272 string "Ordered list of enabled LSMs"
|
D | Kconfig.hardening | 7 While the kernel is built with warnings enabled for any missed 217 When "init_on_alloc" is enabled, all page allocator and slab 229 Similar to "init_on_alloc", when "init_on_free" is enabled,
|
/security/integrity/ |
D | Kconfig | 14 Each of these components can be enabled/disabled separately. 96 be enabled by specifying 'integrity_audit=1' on the kernel
|
/security/selinux/ |
D | Kconfig | 22 necessarily enabled. 57 policies. If unsure, say Y. With this option enabled, the
|
D | hooks.c | 131 unsigned long enabled; in selinux_enabled_setup() local 132 if (!kstrtoul(str, 0, &enabled)) in selinux_enabled_setup() 133 selinux_enabled_boot = enabled ? 1 : 0; in selinux_enabled_setup() 7506 .enabled = &selinux_enabled_boot,
|
/security/selinux/ss/ |
D | avtab.c | 406 u16 enabled; in avtab_read_item() local 457 enabled = (val & AVTAB_ENABLED_OLD) ? AVTAB_ENABLED : 0; in avtab_read_item() 475 key.specified = spec_order[i] | enabled; in avtab_read_item()
|
/security/tomoyo/ |
D | tomoyo.c | 589 .enabled = &tomoyo_enabled,
|
/security/integrity/ima/ |
D | Kconfig | 188 CFG80211_REQUIRE_SIGNED_REGDB are enabled, then both signature
|