Home
last modified time | relevance | path

Searched refs:all (Results 1 – 10 of 10) sorted by relevance

/security/landlock/
A Daccess.h57 u32 all; member
62 sizeof(typeof_member(union access_masks_all, all)));
A Dcred.h133 if (layer.all & masks_all.all) { in landlock_get_applicable_subject()
A Druleset.h240 matches.all |= layer.all; in landlock_union_access_masks()
A DKconfig34 Run all KUnit tests for Landlock with:
/security/integrity/
A DKconfig46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
84 and all Machine Owner Keys (MOK) are added to the machine keyring.
85 If enabled only CA keys are added to the machine keyring, all
/security/
A DKconfig.hardening29 greatest coverage (since all functions can have their
53 all classes of uninitialized stack variable exploits and
61 repeating for all types and padding except float and double
63 repeating for all types and padding.
64 GCC uses 0xFE repeating for all types, and zero for padding.
72 with a zero value. This is intended to eliminate all
165 When "init_on_alloc" is enabled, all page allocator and slab
179 all page allocator and slab allocator memory will be zeroed
A DKconfig189 bool "Force all usermode helper calls through a single binary"
197 To provide an additional layer of security, route all of these
206 If you wish for all usermode helper programs are to be
220 If you wish for all usermode helper programs to be disabled,
/security/integrity/ima/
A DKconfig187 This option defines a policy requiring all firmware to be signed,
197 Enabling this rule will require all kexec'ed kernel images to
210 Enabling this rule will require all kernel modules to be signed
270 This option creates an IMA blacklist keyring, which contains all
/security/apparmor/
A DKconfig23 Build apparmor with debugging logic in apparmor. Not all
/security/keys/
A DKconfig48 in the sense that they stay around after all processes of that UID

Completed in 15 milliseconds