Searched refs:security (Results 1 – 25 of 25) sorted by relevance
| /arch/powerpc/configs/ |
| A D | security.config | 1 # Help: Common security options for PowerPC builds
|
| /arch/s390/include/uapi/asm/ |
| A D | vtoc.h | 46 __u8 security; /* security byte */ member
|
| /arch/arm64/boot/dts/freescale/ |
| A D | imx8qxp.dtsi | 329 #include "imx8-ss-security.dtsi" 341 #include "imx8qxp-ss-security.dtsi"
|
| A D | imx8qm.dtsi | 625 #include "imx8-ss-security.dtsi"
|
| /arch/arm/boot/dts/microchip/ |
| A D | at91-vinco.dts | 75 /* kerkey security module */
|
| A D | sama7d65.dtsi | 86 secumod: security-module@e0004000 {
|
| /arch/arm64/kernel/vdso32/ |
| A D | Makefile | 67 -Wno-format-security \
|
| /arch/powerpc/kernel/ |
| A D | Makefile | 90 obj-$(CONFIG_PPC_BARRIER_NOSPEC) += security.o
|
| /arch/mips/kernel/syscalls/ |
| A D | syscall_n64.tbl | 187 # 177 reserved for security
|
| A D | syscall_n32.tbl | 187 # 177 reserved for security
|
| /arch/x86/ |
| A D | Kconfig | 1281 capabilities and permission from potentially active security 1742 User Mode Instruction Prevention (UMIP) is a security feature in 1834 platforms or on if TSX is in use and the security aspect of tsx is not 2086 image is mapped, as a security feature that deters exploit 2153 (physical memory mapping, vmalloc & vmemmap). This security feature 2227 it can be used to assist security vulnerability exploitation. 2236 to improve security. 2635 memory security restrictions to gain read access to privileged memory 2679 hardware security vulnerability and its exploitation takes advantage 2681 security vulnerabilities. [all …]
|
| /arch/arm64/ |
| A D | Kconfig.platforms | 145 security through TCAM-based frame processing using versatile
|
| A D | Kconfig | 2327 loaded, as a security feature that deters exploit attempts
|
| /arch/x86/entry/syscalls/ |
| A D | syscall_64.tbl | 197 185 common security
|
| /arch/ |
| A D | Kconfig | 729 Note that security guarantees in the kernel differ from the 1515 protection against certain security exploits (e.g. executing the heap 1518 These features are considered standard security practice these days. 1531 protection against certain security exploits (e.g. writing to text)
|
| /arch/arm64/boot/dts/nvidia/ |
| A D | tegra186.dtsi | 26 reg-names = "security", "gpio"; 1271 reg-names = "security", "gpio";
|
| A D | tegra194.dtsi | 35 reg-names = "security", "gpio"; 1653 reg-names = "security", "gpio";
|
| A D | tegra234.dtsi | 69 reg-names = "security", "gpio"; 3943 reg-names = "security", "gpio";
|
| /arch/powerpc/ |
| A D | Kconfig | 687 loaded, as a security feature that deters exploit attempts 1066 Systems with firmware secure boot enabled need to define security
|
| /arch/loongarch/ |
| A D | Kconfig | 656 kernel image is loaded, as a security feature that
|
| /arch/s390/ |
| A D | Kconfig | 671 as a security feature that deters exploit attempts relying on
|
| /arch/arm/ |
| A D | Kconfig.debug | 28 W+X mappings after applying NX, as such mappings are a security risk. 39 still fine, as W+X mappings are not a security hole in
|
| A D | Kconfig | 1248 Increase kernel security by ensuring that normal kernel accesses
|
| /arch/mips/ |
| A D | Kconfig | 2366 increased security at both hardware and software level for 2678 kernel image is loaded, as a security feature that
|
| /arch/riscv/ |
| A D | Kconfig | 1149 loaded, as a security feature that deters exploit attempts
|
Completed in 82 milliseconds