Searched refs:which (Results 1 – 12 of 12) sorted by relevance
/security/integrity/ |
D | Kconfig | 8 This option enables the integrity subsystem, which is comprised 60 Provide a separate, distinct keyring for platform trusted keys, which 66 bool "Provide a keyring to which Machine Owner Keys may be added" 73 If set, provide a keyring to which Machine Owner Keys (MOK) may 103 option adds a kernel parameter 'integrity_audit', which
|
/security/selinux/ |
D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 32 This option enables writing to a selinuxfs node 'disable', which 56 which is useful for experimenting with SELinux and developing 70 /sys/fs/selinux/avc/cache_stats, which may be monitored via 114 cache, which improves the performance of context to string
|
D | avc.c | 204 u8 perm, u8 which) in avc_xperms_has_perm() argument 208 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm() 211 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm() 214 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm() 298 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument 309 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc() 315 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc() 321 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
|
/security/tomoyo/ |
D | Kconfig | 49 operations which can lead to the hijacking of the boot sequence are 51 immediately after loading the fixed part of policy which will allow 52 only operations needed for mounting a partition which contains the 64 This is the default pathname of policy loader which is called before
|
/security/keys/ |
D | Kconfig | 13 It also includes provision of methods by which such keys might be 38 filesystem in which each method needs to request an authentication 53 LSMs gets to rule on which admin-level processes get to access the 133 on keys and keyrings on which the caller has View permission.
|
/security/yama/ |
D | Kconfig | 7 This selects Yama, which extends DAC support with additional
|
/security/keys/trusted-keys/ |
D | Kconfig | 15 which will be generated and RSA-sealed by the TPM.
|
/security/smack/ |
D | Kconfig | 27 identify which rules are necessary and what accesses
|
/security/integrity/evm/ |
D | Kconfig | 23 Default value is 'selected', which is former version 2.
|
/security/ |
D | Kconfig | 100 create a robust initial kernel measurement and verification, which 124 This is the portion of low virtual memory which should be protected 131 Programs which use vm86 functionality or have some need to map
|
D | Kconfig.hardening | 128 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF 167 the stack initialized to the poison value, which both reduces 223 This option provides 'stack_erasing' sysctl, which can be used in 323 structures as much as possible, which may have both a
|
/security/integrity/ima/ |
D | Kconfig | 171 This option defines an IMA appraisal policy at build time, which 268 This option creates an IMA blacklist keyring, which contains all
|