Searched refs:which (Results 1 – 13 of 13) sorted by relevance
| /security/selinux/ |
| A D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 32 which is useful for experimenting with SELinux and developing 46 /sys/fs/selinux/avc/cache_stats, which may be monitored via 67 cache, which improves the performance of context to string
|
| A D | avc.c | 193 u8 perm, u8 which) in avc_xperms_has_perm() argument 197 if ((which == XPERMS_ALLOWED) && in avc_xperms_has_perm() 200 else if ((which == XPERMS_AUDITALLOW) && in avc_xperms_has_perm() 203 else if ((which == XPERMS_DONTAUDIT) && in avc_xperms_has_perm() 290 *avc_xperms_decision_alloc(u8 which) in avc_xperms_decision_alloc() argument 301 if (which & XPERMS_ALLOWED) { in avc_xperms_decision_alloc() 307 if (which & XPERMS_AUDITALLOW) { in avc_xperms_decision_alloc() 313 if (which & XPERMS_DONTAUDIT) { in avc_xperms_decision_alloc()
|
| /security/tomoyo/ |
| A D | Kconfig | 47 operations which can lead to the hijacking of the boot sequence are 49 immediately after loading the fixed part of policy which will allow 50 only operations needed for mounting a partition which contains the 62 This is the default pathname of policy loader which is called before
|
| /security/integrity/ |
| A D | Kconfig | 8 This option enables the integrity subsystem, which is comprised 60 Provide a separate, distinct keyring for platform trusted keys, which 66 bool "Provide a keyring to which Machine Owner Keys may be added" 72 If set, provide a keyring to which Machine Owner Keys (MOK) may 124 option adds a kernel parameter 'integrity_audit', which
|
| /security/keys/ |
| A D | Kconfig | 13 It also includes provision of methods by which such keys might be 38 filesystem in which each method needs to request an authentication 53 LSMs gets to rule on which admin-level processes get to access the 133 on keys and keyrings on which the caller has View permission.
|
| /security/yama/ |
| A D | Kconfig | 7 This selects Yama, which extends DAC support with additional
|
| /security/ |
| A D | Kconfig | 67 WARNING: This feature breaks programs which rely on relocating 153 create a robust initial kernel measurement and verification, which 177 This is the portion of low virtual memory which should be protected 184 Programs which use vm86 functionality or have some need to map 280 LSM_ORDER_FIRST and LSM_ORDER_LAST, which are always enabled
|
| A D | Kconfig.hardening | 62 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF 95 the stack initialized to the poison value, which both reduces 155 This option provides 'stack_erasing' sysctl, which can be used in 311 structures as much as possible, which may have both a
|
| /security/keys/trusted-keys/ |
| A D | Kconfig | 19 which will be generated and RSA-sealed by the TPM.
|
| /security/smack/ |
| A D | Kconfig | 27 identify which rules are necessary and what accesses
|
| /security/integrity/evm/ |
| A D | Kconfig | 24 Default value is 'selected', which is former version 2.
|
| /security/ipe/ |
| A D | Kconfig | 71 volume, which has been mounted with a valid signed root hash,
|
| /security/integrity/ima/ |
| A D | Kconfig | 172 This option defines an IMA appraisal policy at build time, which 270 This option creates an IMA blacklist keyring, which contains all
|
Completed in 15 milliseconds