Searched refs:on (Results 1 – 18 of 18) sorted by relevance
5 depends on SECURITY35 depends on INTEGRITY_SIGNATURE47 depends on SYSTEM_TRUSTED_KEYRING48 depends on INTEGRITY_ASYMMETRIC_KEYS57 depends on INTEGRITY_ASYMMETRIC_KEYS58 depends on SYSTEM_BLACKLIST_KEYRING69 depends on SYSTEM_BLACKLIST_KEYRING101 depends on EFI106 depends on S390112 depends on PPC_SECURE_BOOT[all …]
37 depends on TCG_TPM && HAVE_IMA_KEXEC98 depends on CRYPTO_SHA1=y102 depends on CRYPTO_SHA256=y106 depends on CRYPTO_SHA512=y110 depends on CRYPTO_WP512=y114 depends on CRYPTO_SM3_GENERIC=y227 depends on IMA_APPRAISE235 depends on IMA_APPRAISE288 depends on IMA_LOAD_X509295 depends on IMA_LOAD_X509[all …]
49 depends on !KMSAN69 depends on !KMSAN111 depends on GCC_PLUGINS131 depends on KSTACK_ERASE141 depends on KSTACK_ERASE142 depends on PROC_FS153 depends on KSTACK_ERASE161 depends on !KMSAN174 depends on !KMSAN242 This has the effect of setting "hardened_usercopy=on" on the kernel[all …]
56 depends on 64BIT58 depends on !CHECKPOINT_RESTORE60 Apply mseal on system mappings.77 depends on SYSFS78 depends on MULTIUSER90 depends on AUDIT91 depends on SECURITY103 depends on SECURITY112 depends on SECURITY && INFINIBAND134 depends on SECURITY[all …]
8 depends on SECURITY && SECURITYFS && AUDIT && AUDITSYSCALL20 admins to reconfigure trust requirements on the fly.26 string "Integrity policy to apply on system startup"38 depends on SECONDARY_TRUSTED_KEYRING48 depends on INTEGRITY_PLATFORM_KEYRING57 bool "Enable support for dm-verity based on root hash"58 depends on DM_VERITY67 depends on DM_VERITY && DM_VERITY_VERIFY_ROOTHASH_SIG78 depends on FS_VERITY89 depends on FS_VERITY && FS_VERITY_BUILTIN_SIGNATURES[all …]
4 depends on NET5 depends on INET6 depends on SECURITY17 bool "Reporting on access granted by Smack rules"18 depends on SECURITY_SMACK25 of access initially with the bringup mode set on the36 depends on SECURITY_SMACK37 depends on NETWORK_SECMARK38 depends on NETFILTER47 depends on SECURITY_SMACK
23 const char *on = "=1;", *off = "=0;"; in selinux_ima_collect_state() local29 len = strlen(on); in selinux_ima_collect_state()40 rc = strlcat(buf, selinux_initialized() ? on : off, buf_len); in selinux_ima_collect_state()46 rc = strlcat(buf, enforcing_enabled() ? on : off, buf_len); in selinux_ima_collect_state()52 rc = strlcat(buf, checkreqprot_get() ? on : off, buf_len); in selinux_ima_collect_state()59 rc = strlcat(buf, selinux_state.policycap[i] ? on : off, in selinux_ima_collect_state()
4 depends on SECURITY_NETWORK && AUDIT && NET && INET14 depends on SECURITY_SELINUX19 functionality can be disabled with selinux=0 on the kernel28 depends on SECURITY_SELINUX35 unless you specify enforcing=1 on the kernel command line. You42 depends on SECURITY_SELINUX51 depends on SECURITY_SELINUX63 depends on SECURITY_SELINUX74 depends on SECURITY_SELINUX
4 depends on SECURITY5 depends on NET20 depends on SECURITY_TOMOYO33 depends on SECURITY_TOMOYO36 audit logs that the kernel can hold on memory.43 depends on SECURITY_TOMOYO59 depends on SECURITY_TOMOYO60 depends on !SECURITY_TOMOYO_OMIT_USERSPACE_LOADER69 depends on SECURITY_TOMOYO70 depends on !SECURITY_TOMOYO_OMIT_USERSPACE_LOADER[all …]
26 depends on KEYS35 by the last step to save on the searching.44 depends on KEYS61 depends on KEYS62 depends on TMPFS73 depends on KEYS88 depends on KEYS107 depends on ENCRYPTED_KEYS117 depends on KEYS130 depends on KEYS && WATCH_QUEUE[all …]
4 depends on SECURITY && BLOCK10 rejected. This is best used on systems without an initrd that16 depends on SECURITY_LOADPIN19 depends on !MODULE_COMPRESS || MODULE_DECOMPRESS27 depends on SECURITY_LOADPIN && DM_VERITY=y && SECURITYFS36 on the LoadPin securityfs entry 'dm-verity'. The ioctl38 parameter. The file must be located on the pinned root and
4 depends on SECURITY && NET20 depends on SECURITY_APPARMOR30 depends on SECURITY_APPARMOR_DEBUG40 depends on SECURITY_APPARMOR_DEBUG49 depends on SECURITY_APPARMOR61 depends on SECURITY_APPARMOR_INTROSPECT_POLICY73 depends on SECURITY_APPARMOR_HASH80 however it can slow down policy load on some devices. In86 depends on SECURITY_APPARMOR_INTROSPECT_POLICY98 depends on SECURITY_APPARMOR[all …]
6 depends on TCG_TPM >= TRUSTED_KEYS25 depends on TEE >= TRUSTED_KEYS34 depends on CRYPTO_DEV_FSL_CAAM_JR >= TRUSTED_KEYS44 depends on CRYPTO_DEV_MXS_DCP >= TRUSTED_KEYS
3 depends on SECURITY11 depends on SECURITY_LOCKDOWN_LSM14 to ensure that lockdown enforcement can be carried out on kernel22 depends on SECURITY_LOCKDOWN_LSM
20 depends on EVM33 depends on EVM && SECURITY_SMACK50 depends on EVM61 depends on EVM && INTEGRITY_TRUSTED_KEYRING73 depends on EVM_LOAD_X509
5 depends on SECURITY26 depends on KUNIT=y27 depends on SECURITY_LANDLOCK
4 depends on SECURITY
Completed in 65 milliseconds