Home
last modified time | relevance | path

Searched refs:which (Results 1 – 12 of 12) sorted by relevance

/security/integrity/
DKconfig8 This option enables the integrity subsystem, which is comprised
60 Provide a separate, distinct keyring for platform trusted keys, which
66 bool "Provide a keyring to which Machine Owner Keys may be added"
73 If set, provide a keyring to which Machine Owner Keys (MOK) may
103 option adds a kernel parameter 'integrity_audit', which
/security/selinux/
DKconfig17 This option adds a kernel parameter 'selinux', which allows SELinux
32 This option enables writing to a selinuxfs node 'disable', which
56 which is useful for experimenting with SELinux and developing
70 /sys/fs/selinux/avc/cache_stats, which may be monitored via
114 cache, which improves the performance of context to string
Davc.c204 u8 perm, u8 which) in avc_xperms_has_perm() argument
208 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm()
211 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm()
214 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm()
298 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument
309 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc()
315 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc()
321 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
/security/tomoyo/
DKconfig49 operations which can lead to the hijacking of the boot sequence are
51 immediately after loading the fixed part of policy which will allow
52 only operations needed for mounting a partition which contains the
64 This is the default pathname of policy loader which is called before
/security/keys/
DKconfig13 It also includes provision of methods by which such keys might be
38 filesystem in which each method needs to request an authentication
53 LSMs gets to rule on which admin-level processes get to access the
133 on keys and keyrings on which the caller has View permission.
/security/yama/
DKconfig7 This selects Yama, which extends DAC support with additional
/security/keys/trusted-keys/
DKconfig15 which will be generated and RSA-sealed by the TPM.
/security/smack/
DKconfig27 identify which rules are necessary and what accesses
/security/integrity/evm/
DKconfig23 Default value is 'selected', which is former version 2.
/security/
DKconfig100 create a robust initial kernel measurement and verification, which
124 This is the portion of low virtual memory which should be protected
131 Programs which use vm86 functionality or have some need to map
DKconfig.hardening128 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF
167 the stack initialized to the poison value, which both reduces
223 This option provides 'stack_erasing' sysctl, which can be used in
323 structures as much as possible, which may have both a
/security/integrity/ima/
DKconfig171 This option defines an IMA appraisal policy at build time, which
268 This option creates an IMA blacklist keyring, which contains all