Home
last modified time | relevance | path

Searched refs:which (Results 1 – 13 of 13) sorted by relevance

/security/selinux/
A DKconfig17 This option adds a kernel parameter 'selinux', which allows SELinux
32 which is useful for experimenting with SELinux and developing
46 /sys/fs/selinux/avc/cache_stats, which may be monitored via
67 cache, which improves the performance of context to string
A Davc.c193 u8 perm, u8 which) in avc_xperms_has_perm() argument
197 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm()
200 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm()
203 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm()
290 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument
301 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc()
307 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc()
313 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
/security/tomoyo/
A DKconfig47 operations which can lead to the hijacking of the boot sequence are
49 immediately after loading the fixed part of policy which will allow
50 only operations needed for mounting a partition which contains the
62 This is the default pathname of policy loader which is called before
/security/integrity/
A DKconfig8 This option enables the integrity subsystem, which is comprised
60 Provide a separate, distinct keyring for platform trusted keys, which
66 bool "Provide a keyring to which Machine Owner Keys may be added"
72 If set, provide a keyring to which Machine Owner Keys (MOK) may
124 option adds a kernel parameter 'integrity_audit', which
/security/keys/
A DKconfig13 It also includes provision of methods by which such keys might be
38 filesystem in which each method needs to request an authentication
53 LSMs gets to rule on which admin-level processes get to access the
133 on keys and keyrings on which the caller has View permission.
/security/yama/
A DKconfig7 This selects Yama, which extends DAC support with additional
/security/
A DKconfig67 WARNING: This feature breaks programs which rely on relocating
153 create a robust initial kernel measurement and verification, which
177 This is the portion of low virtual memory which should be protected
184 Programs which use vm86 functionality or have some need to map
280 LSM_ORDER_FIRST and LSM_ORDER_LAST, which are always enabled
A DKconfig.hardening62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF
95 the stack initialized to the poison value, which both reduces
155 This option provides 'stack_erasing' sysctl, which can be used in
311 structures as much as possible, which may have both a
/security/keys/trusted-keys/
A DKconfig19 which will be generated and RSA-sealed by the TPM.
/security/smack/
A DKconfig27 identify which rules are necessary and what accesses
/security/integrity/evm/
A DKconfig24 Default value is 'selected', which is former version 2.
/security/ipe/
A DKconfig71 volume, which has been mounted with a valid signed root hash,
/security/integrity/ima/
A DKconfig172 This option defines an IMA appraisal policy at build time, which
270 This option creates an IMA blacklist keyring, which contains all

Completed in 15 milliseconds