Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 18 of 18) sorted by relevance

/security/integrity/evm/
Devm_main.c41 .enabled = true
46 .enabled = true
51 .enabled = true
56 .enabled = true
61 .enabled = true
66 .enabled = true
71 .enabled = true
75 .enabled = true
102 !evm_config_default_xattrnames[i].enabled ? in evm_init_config()
295 if (!all_xattrs && !xattr->enabled) in evm_protected_xattr_common()
Devm_secfs.c143 if (!xattr->enabled) in evm_read_xattrs()
156 if (!xattr->enabled) in evm_read_xattrs()
209 xattr->enabled = true; in evm_write_xattrs()
256 if (!tmp->enabled) { in evm_write_xattrs()
257 tmp->enabled = true; in evm_write_xattrs()
Devm.h32 bool enabled; member
DKconfig54 When this option is enabled, root can add additional xattrs to the
Devm_crypto.c246 if (type != EVM_XATTR_PORTABLE_DIGSIG && !xattr->enabled) in evm_calc_hmac_or_hash()
/security/apparmor/
DKconfig36 is enabled by default. The generation of sha1 hashes for
41 enabled only if needed.
49 debugging logic will necessarily be enabled. A submenu will
64 bool "Debug messages enabled by default"
69 When enabled, various debug messages will be logged to
Dlsm.c1387 module_param_named(enabled, apparmor_enabled, aaintbool, 0444);
1391 unsigned long enabled; in apparmor_enabled_setup() local
1392 int error = kstrtoul(str, 0, &enabled); in apparmor_enabled_setup()
1394 apparmor_enabled = enabled ? 1 : 0; in apparmor_enabled_setup()
1909 .enabled = &apparmor_enabled,
/security/lockdown/
DKconfig16 subsystem is fully initialised. If enabled, lockdown will
30 No lockdown functionality is enabled by default. Lockdown may be
31 enabled via the kernel commandline or /sys/kernel/security/lockdown.
/security/loadpin/
DKconfig9 enabled, any files that come from other filesystems will be
19 selected, it can be enabled at boot with the kernel parameter
/security/
Dsecurity.c103 if (!lsm->enabled) in is_enabled()
106 return *lsm->enabled; in is_enabled()
112 static void __init set_enabled(struct lsm_info *lsm, bool enabled) in set_enabled() argument
118 if (!lsm->enabled) { in set_enabled()
119 if (enabled) in set_enabled()
120 lsm->enabled = &lsm_enabled_true; in set_enabled()
122 lsm->enabled = &lsm_enabled_false; in set_enabled()
123 } else if (lsm->enabled == &lsm_enabled_true) { in set_enabled()
124 if (!enabled) in set_enabled()
125 lsm->enabled = &lsm_enabled_false; in set_enabled()
[all …]
DKconfig53 If enabled, a security module can use these hooks to
62 If enabled, a security module can use these hooks to
71 If enabled, a security module can use these hooks to
84 If enabled, a security module can use these hooks to
272 string "Ordered list of enabled LSMs"
DKconfig.hardening7 While the kernel is built with warnings enabled for any missed
217 When "init_on_alloc" is enabled, all page allocator and slab
229 Similar to "init_on_alloc", when "init_on_free" is enabled,
/security/integrity/
DKconfig14 Each of these components can be enabled/disabled separately.
96 be enabled by specifying 'integrity_audit=1' on the kernel
/security/selinux/
DKconfig22 necessarily enabled.
57 policies. If unsure, say Y. With this option enabled, the
Dhooks.c131 unsigned long enabled; in selinux_enabled_setup() local
132 if (!kstrtoul(str, 0, &enabled)) in selinux_enabled_setup()
133 selinux_enabled_boot = enabled ? 1 : 0; in selinux_enabled_setup()
7506 .enabled = &selinux_enabled_boot,
/security/selinux/ss/
Davtab.c406 u16 enabled; in avtab_read_item() local
457 enabled = (val & AVTAB_ENABLED_OLD) ? AVTAB_ENABLED : 0; in avtab_read_item()
475 key.specified = spec_order[i] | enabled; in avtab_read_item()
/security/tomoyo/
Dtomoyo.c589 .enabled = &tomoyo_enabled,
/security/integrity/ima/
DKconfig188 CFG80211_REQUIRE_SIGNED_REGDB are enabled, then both signature