Home
last modified time | relevance | path

Searched refs:on (Results 1 – 18 of 18) sorted by relevance

/security/integrity/
A DKconfig5 depends on SECURITY
35 depends on INTEGRITY_SIGNATURE
47 depends on SYSTEM_TRUSTED_KEYRING
48 depends on INTEGRITY_ASYMMETRIC_KEYS
57 depends on INTEGRITY_ASYMMETRIC_KEYS
58 depends on SYSTEM_BLACKLIST_KEYRING
69 depends on SYSTEM_BLACKLIST_KEYRING
101 depends on EFI
106 depends on S390
112 depends on PPC_SECURE_BOOT
[all …]
/security/integrity/ima/
A DKconfig37 depends on TCG_TPM && HAVE_IMA_KEXEC
98 depends on CRYPTO_SHA1=y
102 depends on CRYPTO_SHA256=y
106 depends on CRYPTO_SHA512=y
110 depends on CRYPTO_WP512=y
114 depends on CRYPTO_SM3_GENERIC=y
227 depends on IMA_APPRAISE
235 depends on IMA_APPRAISE
288 depends on IMA_LOAD_X509
295 depends on IMA_LOAD_X509
[all …]
/security/
A DKconfig.hardening49 depends on !KMSAN
69 depends on !KMSAN
111 depends on GCC_PLUGINS
131 depends on KSTACK_ERASE
141 depends on KSTACK_ERASE
142 depends on PROC_FS
153 depends on KSTACK_ERASE
161 depends on !KMSAN
174 depends on !KMSAN
242 This has the effect of setting "hardened_usercopy=on" on the kernel
[all …]
A DKconfig56 depends on 64BIT
58 depends on !CHECKPOINT_RESTORE
60 Apply mseal on system mappings.
77 depends on SYSFS
78 depends on MULTIUSER
90 depends on AUDIT
91 depends on SECURITY
103 depends on SECURITY
112 depends on SECURITY && INFINIBAND
134 depends on SECURITY
[all …]
/security/ipe/
A DKconfig8 depends on SECURITY && SECURITYFS && AUDIT && AUDITSYSCALL
20 admins to reconfigure trust requirements on the fly.
26 string "Integrity policy to apply on system startup"
38 depends on SECONDARY_TRUSTED_KEYRING
48 depends on INTEGRITY_PLATFORM_KEYRING
57 bool "Enable support for dm-verity based on root hash"
58 depends on DM_VERITY
67 depends on DM_VERITY && DM_VERITY_VERIFY_ROOTHASH_SIG
78 depends on FS_VERITY
89 depends on FS_VERITY && FS_VERITY_BUILTIN_SIGNATURES
[all …]
/security/smack/
A DKconfig4 depends on NET
5 depends on INET
6 depends on SECURITY
17 bool "Reporting on access granted by Smack rules"
18 depends on SECURITY_SMACK
25 of access initially with the bringup mode set on the
36 depends on SECURITY_SMACK
37 depends on NETWORK_SECMARK
38 depends on NETFILTER
47 depends on SECURITY_SMACK
/security/selinux/
A Dima.c23 const char *on = "=1;", *off = "=0;"; in selinux_ima_collect_state() local
29 len = strlen(on); in selinux_ima_collect_state()
40 rc = strlcat(buf, selinux_initialized() ? on : off, buf_len); in selinux_ima_collect_state()
46 rc = strlcat(buf, enforcing_enabled() ? on : off, buf_len); in selinux_ima_collect_state()
52 rc = strlcat(buf, checkreqprot_get() ? on : off, buf_len); in selinux_ima_collect_state()
59 rc = strlcat(buf, selinux_state.policycap[i] ? on : off, in selinux_ima_collect_state()
A DKconfig4 depends on SECURITY_NETWORK && AUDIT && NET && INET
14 depends on SECURITY_SELINUX
19 functionality can be disabled with selinux=0 on the kernel
28 depends on SECURITY_SELINUX
35 unless you specify enforcing=1 on the kernel command line. You
42 depends on SECURITY_SELINUX
51 depends on SECURITY_SELINUX
63 depends on SECURITY_SELINUX
74 depends on SECURITY_SELINUX
/security/tomoyo/
A DKconfig4 depends on SECURITY
5 depends on NET
20 depends on SECURITY_TOMOYO
33 depends on SECURITY_TOMOYO
36 audit logs that the kernel can hold on memory.
43 depends on SECURITY_TOMOYO
59 depends on SECURITY_TOMOYO
60 depends on !SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
69 depends on SECURITY_TOMOYO
70 depends on !SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
[all …]
/security/keys/
A DKconfig26 depends on KEYS
35 by the last step to save on the searching.
44 depends on KEYS
61 depends on KEYS
62 depends on TMPFS
73 depends on KEYS
88 depends on KEYS
107 depends on ENCRYPTED_KEYS
117 depends on KEYS
130 depends on KEYS && WATCH_QUEUE
[all …]
/security/loadpin/
A DKconfig4 depends on SECURITY && BLOCK
10 rejected. This is best used on systems without an initrd that
16 depends on SECURITY_LOADPIN
19 depends on !MODULE_COMPRESS || MODULE_DECOMPRESS
27 depends on SECURITY_LOADPIN && DM_VERITY=y && SECURITYFS
36 on the LoadPin securityfs entry 'dm-verity'. The ioctl
38 parameter. The file must be located on the pinned root and
/security/apparmor/
A DKconfig4 depends on SECURITY && NET
20 depends on SECURITY_APPARMOR
30 depends on SECURITY_APPARMOR_DEBUG
40 depends on SECURITY_APPARMOR_DEBUG
49 depends on SECURITY_APPARMOR
61 depends on SECURITY_APPARMOR_INTROSPECT_POLICY
73 depends on SECURITY_APPARMOR_HASH
80 however it can slow down policy load on some devices. In
86 depends on SECURITY_APPARMOR_INTROSPECT_POLICY
98 depends on SECURITY_APPARMOR
[all …]
/security/keys/trusted-keys/
A DKconfig6 depends on TCG_TPM >= TRUSTED_KEYS
25 depends on TEE >= TRUSTED_KEYS
34 depends on CRYPTO_DEV_FSL_CAAM_JR >= TRUSTED_KEYS
44 depends on CRYPTO_DEV_MXS_DCP >= TRUSTED_KEYS
/security/lockdown/
A DKconfig3 depends on SECURITY
11 depends on SECURITY_LOCKDOWN_LSM
14 to ensure that lockdown enforcement can be carried out on kernel
22 depends on SECURITY_LOCKDOWN_LSM
/security/integrity/evm/
A DKconfig20 depends on EVM
33 depends on EVM && SECURITY_SMACK
50 depends on EVM
61 depends on EVM && INTEGRITY_TRUSTED_KEYRING
73 depends on EVM_LOAD_X509
/security/landlock/
A DKconfig5 depends on SECURITY
26 depends on KUNIT=y
27 depends on SECURITY_LANDLOCK
/security/yama/
A DKconfig4 depends on SECURITY
/security/safesetid/
A DKconfig4 depends on SECURITY

Completed in 65 milliseconds