/linux-6.3-rc2/drivers/memory/tegra/ |
A D | tegra194.c | 20 .security = 0x004, 30 .security = 0x00c, 40 .security = 0x014, 50 .security = 0x0ac, 60 .security = 0x0b4, 70 .security = 0x0e4, 80 .security = 0x0fc, 90 .security = 0x13c, 100 .security = 0x15c, 110 .security = 0x1ac, [all …]
|
A D | tegra186.c | 154 .security = 0x004, 164 .security = 0x074, 174 .security = 0x0ac, 184 .security = 0x0b4, 194 .security = 0x0e4, 204 .security = 0x0fc, 214 .security = 0x13c, 224 .security = 0x15c, 234 .security = 0x18c, 244 .security = 0x1ac, [all …]
|
A D | tegra234.c | 20 .security = 0x2c4, 30 .security = 0x2cc, 40 .security = 0x2d4, 50 .security = 0x2dc, 60 .security = 0x2e4, 70 .security = 0x2fc, 80 .security = 0x30c, 90 .security = 0x31c, 100 .security = 0x32c, 110 .security = 0x33c, [all …]
|
/linux-6.3-rc2/Documentation/security/ |
A D | lsm.rst | 25 patch to support its security needs. 44 security module. 56 logic is implemented as a security module. 65 of security modules that are active on the system. 73 program execution security information, security fields are included in 77 security information, a security field is included in :c:type:`struct 81 For System V IPC security information, 91 network device security information, security fields were added to 104 general security module stacking. It defines 117 and free security structures for inode objects. [all …]
|
/linux-6.3-rc2/Documentation/driver-api/nvdimm/ |
A D | security.rst | 9 specification [1], security DSMs are introduced. The spec added the following 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 19 /sys/devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0012:00/ndbus0/nmem0/security 21 The "show" attribute of that attribute will display the security state for 23 frozen, and overwrite. If security is not supported, the sysfs attribute 27 in order to support some of the security functionalities: 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 90 The security disable command format is: 127 This command is only available when security is disabled. [all …]
|
/linux-6.3-rc2/security/integrity/evm/ |
A D | Kconfig | 11 EVM protects a file's security extended attributes against 37 In addition to the original security xattrs (eg. security.selinux, 38 security.SMACK64, security.capability, and security.ima) included 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 41 security.SMACK64MMAP. 56 /sys/kernel/security/integrity/evm/evm_xattrs.
|
/linux-6.3-rc2/Documentation/netlabel/ |
A D | introduction.rst | 12 NetLabel is a mechanism which can be used by kernel security modules to attach 13 security attributes to outgoing network packets generated from user space 14 applications and read security attributes from incoming network packets. It 16 layer, and the kernel security module API. 22 network packet's security attributes. If any translation between the network 23 security attributes and those on the host are required then the protocol 26 the NetLabel kernel security module API described below. 44 The purpose of the NetLabel security module API is to provide a protocol 46 to protocol independence, the security module API is designed to be completely 50 Detailed information about the NetLabel security module API can be found in the
|
A D | lsm_interface.rst | 12 NetLabel is a mechanism which can set and retrieve security attributes from 15 The NetLabel security module API is defined in 'include/net/netlabel.h' but a 22 it uses the concept of security attributes to refer to the packet's security 23 labels. The NetLabel security attributes are defined by the 25 NetLabel subsystem converts the security attributes to and from the correct 28 security attributes into whatever security identifiers are in use for their 44 label and the internal LSM security identifier can be time consuming. The 47 LSM has received a packet, used NetLabel to decode its security attributes, 48 and translated the security attributes into a LSM internal identifier the LSM
|
A D | cipso_ipv4.rst | 27 label by using the NetLabel security module API; if the NetLabel "domain" is 37 NetLabel security module API to extract the security attributes of the packet. 44 The CIPSO/IPv4 protocol engine contains a mechanism to translate CIPSO security 49 different security attribute mapping table. 54 The NetLabel system provides a framework for caching security attribute
|
/linux-6.3-rc2/security/ |
A D | Kconfig | 8 source "security/keys/Kconfig" 23 bool "Enable different security models" 201 source "security/selinux/Kconfig" 202 source "security/smack/Kconfig" 203 source "security/tomoyo/Kconfig" 204 source "security/apparmor/Kconfig" 205 source "security/loadpin/Kconfig" 206 source "security/yama/Kconfig" 207 source "security/safesetid/Kconfig" 208 source "security/lockdown/Kconfig" [all …]
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | security-bugs.rst | 6 Linux kernel developers take security very seriously. As such, we'd 7 like to know when a security bug is found so that it can be fixed and 8 disclosed as quickly as possible. Please report security bugs to the 9 Linux kernel security team. 14 The Linux kernel security team can be contacted by email at 15 <security@kernel.org>. This is a private list of security officers 19 security team will bring in extra help from area maintainers to 20 understand and fix the security vulnerability. 39 The security list is not a disclosure channel. For that, see Coordination 62 information submitted to the security list and any followup discussions [all …]
|
/linux-6.3-rc2/Documentation/admin-guide/LSM/ |
A D | apparmor.rst | 8 AppArmor is MAC style security extension for the Linux kernel. It implements 19 If AppArmor should be selected as the default security module then set:: 26 If AppArmor is not the default security module it can be enabled by passing 27 ``security=apparmor`` on the kernel's command line. 29 If AppArmor is the default security module it can be disabled by passing 30 ``apparmor=0, security=XXXX`` (where ``XXXX`` is valid security module), on the
|
A D | index.rst | 6 various security checks to be hooked by new kernel extensions. The name 10 ``"security=..."`` kernel command line argument, in the case where multiple 14 (MAC) extensions which provide a comprehensive security policy. Examples 25 A list of the active security modules can be found by reading 26 ``/sys/kernel/security/lsm``. This is a comma separated list, and 32 Process attributes associated with "major" security modules should 34 A security module may maintain a module specific subdirectory there, 36 security module and contains all its special files. The files directly
|
/linux-6.3-rc2/security/selinux/ |
A D | xfrm.c | 67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 183 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 184 if (x->security) in selinux_xfrm_state_pol_flow_match() 191 if (!x->security) in selinux_xfrm_state_pol_flow_match() 199 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match() 224 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress() 239 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_skb_sid_ingress() 375 x->security = ctx; in selinux_xfrm_state_alloc_acquire() 387 selinux_xfrm_free(x->security); in selinux_xfrm_state_free() 395 return selinux_xfrm_delete(x->security); in selinux_xfrm_state_delete() [all …]
|
/linux-6.3-rc2/Documentation/process/ |
A D | embargoed-hardware-issues.rst | 9 Hardware issues which result in security problems are a different category 10 of security bugs than pure software bugs which only affect the Linux 26 kernel security team. 28 The team only handles the coordination of embargoed hardware security 31 Linux kernel security team (:ref:`Documentation/admin-guide/ 43 - PGP: https://www.kernel.org/static/files/hardware-security.asc 44 - S/MIME: https://www.kernel.org/static/files/hardware-security.crt 50 Hardware security officers 53 The current team of hardware security officers: 111 immediately to the Hardware security officers. [all …]
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | procfs-attr-current | 2 Contact: linux-security-module@vger.kernel.org, 5 Description: The current security information used by a Linux 6 security module (LSM) that is active on the system. 8 this interface and hence obtain the security state 13 this interface and hence change the security state of
|
A D | procfs-attr-exec | 2 Contact: linux-security-module@vger.kernel.org, 5 Description: The security information to be used on the process 6 by a Linux security module (LSM) active on the system 9 this interface and hence obtain the security state 14 this interface and hence change the security state of
|
A D | sysfs-driver-intel-m10-bmc-sec-update | 1 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/sr_root_entry_hash 11 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/pr_root_entry_hash 21 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/bmc_root_entry_hash 31 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/sr_canceled_csks 39 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/pr_canceled_csks 47 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/bmc_canceled_csks 55 What: /sys/bus/platform/drivers/intel-m10bmc-sec-update/.../security/flash_count
|
A D | evm | 1 What: /sys/kernel/security/evm 2 What: /sys/kernel/security/*/evm 6 EVM protects a file's security extended attributes(xattrs) 9 value as the extended attribute 'security.evm'. 11 EVM supports two classes of security.evm. The first is 85 or validate the 'security.evm' xattr, but returns 92 Documentation/security/keys/trusted-encrypted.rst. Both 97 What: /sys/kernel/security/*/evm/evm_xattrs
|
/linux-6.3-rc2/drivers/acpi/nfit/ |
A D | Kconfig | 18 bool "Enable debug for NVDIMM security commands" 22 other security features. The payloads for the commands that 24 security material. Disable debug of those command payloads 26 on NVDIMM security enabling say Y, otherwise say N.
|
/linux-6.3-rc2/Documentation/translations/zh_CN/admin-guide/ |
A D | security-bugs.rst | 3 :Original: :doc:`../../../admin-guide/security-bugs` 18 可以通过电子邮件<security@kernel.org>联系Linux内核安全团队。这是一个安全人员 61 <http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists>。
|
/linux-6.3-rc2/Documentation/translations/zh_TW/admin-guide/ |
A D | security-bugs.rst | 5 :Original: :doc:`../../../admin-guide/security-bugs` 21 可以通過電子郵件<security@kernel.org>聯繫Linux內核安全團隊。這是一個安全人員 64 <http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists>。
|
/linux-6.3-rc2/fs/ext2/ |
A D | Kconfig | 38 implemented by security modules like SELinux. This option 39 enables an extended attribute handler for file security 42 If you are not using a security module that requires using 43 extended attributes for file security labels, say N.
|
/linux-6.3-rc2/fs/9p/ |
A D | Kconfig | 40 implemented by security modules like SELinux. This option 41 enables an extended attribute handler for file security 44 If you are not using a security module that requires using 45 extended attributes for file security labels, say N.
|
/linux-6.3-rc2/drivers/gpu/drm/i915/gt/ |
A D | gen6_engine_cs.c | 233 u32 security; in gen6_emit_bb_start() local 236 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start() 238 security = 0; in gen6_emit_bb_start() 244 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start() 255 u32 security; in hsw_emit_bb_start() local 258 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start() 260 security = 0; in hsw_emit_bb_start() 266 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
|