Home
last modified time | relevance | path

Searched refs:command (Results 1 – 8 of 8) sorted by relevance

/security/selinux/
A DKconfig20 command line. The purpose of this option is to allow a single
35 unless you specify enforcing=1 on the kernel command line. You
/security/tomoyo/
A DKconfig64 command line option.
73 You can override this setting via TOMOYO_trigger= kernel command line
/security/integrity/ima/
A DKconfig74 by specifying "ima_template=" on the boot command line.
93 hash algorithm can be overwritten using the kernel command
174 policy name on the boot command line. The build time appraisal
231 (eg. fix, log) from the boot command line.
/security/apparmor/
A Dlsm.c857 char *command, *largs = NULL, *args = value; in do_setattr() local
878 command = strsep(&args, " "); in do_setattr()
887 if (strcmp(command, "changehat") == 0) { in do_setattr()
890 } else if (strcmp(command, "permhat") == 0) { in do_setattr()
893 } else if (strcmp(command, "changeprofile") == 0) { in do_setattr()
895 } else if (strcmp(command, "permprofile") == 0) { in do_setattr()
897 } else if (strcmp(command, "stack") == 0) { in do_setattr()
902 if (strcmp(command, "exec") == 0) in do_setattr()
904 else if (strcmp(command, "stack") == 0) in do_setattr()
/security/keys/trusted-keys/
A Dtrusted_tpm1.c171 const uint32_t command, in TSS_checkhmac1() argument
196 ordinal = command; in TSS_checkhmac1()
256 const uint32_t command, in TSS_checkhmac2() argument
284 ordinal = command; in TSS_checkhmac2()
/security/
A DKconfig.hardening164 command line. This can be disabled with "init_on_alloc=0".
177 command line. This can be disabled with "init_on_free=0".
243 command line. This can be disabled with "hardened_usercopy=off".
A DKconfig217 be in the first argument passed to this program on the command
/security/integrity/
A DKconfig131 command line.

Completed in 16 milliseconds