Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 380) sorted by relevance

12345678910>>...16

/Linux-v5.15/drivers/memory/tegra/
Dtegra194.c20 .security = 0x004,
30 .security = 0x00c,
40 .security = 0x014,
50 .security = 0x0ac,
60 .security = 0x0b4,
70 .security = 0x0e4,
80 .security = 0x0fc,
90 .security = 0x13c,
100 .security = 0x15c,
110 .security = 0x1ac,
[all …]
Dtegra186.c29 u32 override, security; in tegra186_mc_program_sid() local
32 security = readl(mc->regs + client->regs.sid.security); in tegra186_mc_program_sid()
35 client->name, override, security); in tegra186_mc_program_sid()
42 security = readl(mc->regs + client->regs.sid.security); in tegra186_mc_program_sid()
45 client->name, override, security); in tegra186_mc_program_sid()
81 value = readl(mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override()
100 writel(value, mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override()
158 .security = 0x004,
168 .security = 0x074,
178 .security = 0x0ac,
[all …]
/Linux-v5.15/Documentation/security/
Dlsm.rst20 implemented as its own particular kernel patch. Several other security
25 patch to support its security needs.
28 remarks that described a security framework he would be willing to
30 general framework that would provide a set of security hooks to control
31 operations on kernel objects and a set of opaque security fields in
32 kernel data structures for maintaining security attributes. This
34 desired model of security. Linus also suggested the possibility of
38 such a framework. LSM was a joint development effort by several security
44 security module.
50 security modules. In particular, the LSM framework is primarily focused
[all …]
/Linux-v5.15/Documentation/driver-api/nvdimm/
Dsecurity.rst9 specification [1], security DSMs are introduced. The spec added the following
10 security DSMs: "get security state", "set passphrase", "disable passphrase",
12 data structure has been added to struct dimm in order to support the security
17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For
19 /sys/devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0012:00/ndbus0/nmem0/security
21 The "show" attribute of that attribute will display the security state for
23 frozen, and overwrite. If security is not supported, the sysfs attribute
27 in order to support some of the security functionalities:
29 disable <keyid> - disable enabled security and remove key.
30 freeze - freeze changing of security states.
[all …]
/Linux-v5.15/security/integrity/evm/
DKconfig11 EVM protects a file's security extended attributes against
37 In addition to the original security xattrs (eg. security.selinux,
38 security.SMACK64, security.capability, and security.ima) included
40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and
41 security.SMACK64MMAP.
56 /sys/kernel/security/integrity/evm/evm_xattrs.
/Linux-v5.15/Documentation/netlabel/
Dintroduction.rst12 NetLabel is a mechanism which can be used by kernel security modules to attach
13 security attributes to outgoing network packets generated from user space
14 applications and read security attributes from incoming network packets. It
16 layer, and the kernel security module API.
22 network packet's security attributes. If any translation between the network
23 security attributes and those on the host are required then the protocol
26 the NetLabel kernel security module API described below.
44 The purpose of the NetLabel security module API is to provide a protocol
46 to protocol independence, the security module API is designed to be completely
50 Detailed information about the NetLabel security module API can be found in the
Dlsm_interface.rst12 NetLabel is a mechanism which can set and retrieve security attributes from
15 The NetLabel security module API is defined in 'include/net/netlabel.h' but a
22 it uses the concept of security attributes to refer to the packet's security
23 labels. The NetLabel security attributes are defined by the
25 NetLabel subsystem converts the security attributes to and from the correct
28 security attributes into whatever security identifiers are in use for their
44 label and the internal LSM security identifier can be time consuming. The
47 LSM has received a packet, used NetLabel to decode its security attributes,
48 and translated the security attributes into a LSM internal identifier the LSM
Dcipso_ipv4.rst27 label by using the NetLabel security module API; if the NetLabel "domain" is
37 NetLabel security module API to extract the security attributes of the packet.
44 The CIPSO/IPv4 protocol engine contains a mechanism to translate CIPSO security
49 different security attribute mapping table.
54 The NetLabel system provides a framework for caching security attribute
/Linux-v5.15/security/selinux/
Dxfrm.c67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
183 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
184 if (x->security) in selinux_xfrm_state_pol_flow_match()
191 if (!x->security) in selinux_xfrm_state_pol_flow_match()
199 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match()
224 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress()
239 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_skb_sid_ingress()
337 return selinux_xfrm_alloc_user(&x->security, uctx, GFP_KERNEL); in selinux_xfrm_state_alloc()
375 x->security = ctx; in selinux_xfrm_state_alloc_acquire()
387 selinux_xfrm_free(x->security); in selinux_xfrm_state_free()
[all …]
/Linux-v5.15/Documentation/admin-guide/
Dsecurity-bugs.rst6 Linux kernel developers take security very seriously. As such, we'd
7 like to know when a security bug is found so that it can be fixed and
8 disclosed as quickly as possible. Please report security bugs to the
9 Linux kernel security team.
14 The Linux kernel security team can be contacted by email at
15 <security@kernel.org>. This is a private list of security officers
19 security team will bring in extra help from area maintainers to
20 understand and fix the security vulnerability.
39 The security list is not a disclosure channel. For that, see Coordination
62 information submitted to the security list and any followup discussions
[all …]
/Linux-v5.15/security/
DKconfig8 source "security/keys/Kconfig"
23 bool "Enable different security models"
27 This allows you to choose different security modules to be
30 If this option is not selected, the default Linux security
44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM).
52 This enables the socket and networking security hooks.
53 If enabled, a security module can use these hooks to
72 This enables the Infiniband security hooks.
73 If enabled, a security module can use these hooks to
81 This enables the XFRM (IPSec) networking security hooks.
[all …]
/Linux-v5.15/Documentation/admin-guide/LSM/
Dapparmor.rst8 AppArmor is MAC style security extension for the Linux kernel. It implements
19 If AppArmor should be selected as the default security module then set::
26 If AppArmor is not the default security module it can be enabled by passing
27 ``security=apparmor`` on the kernel's command line.
29 If AppArmor is the default security module it can be disabled by passing
30 ``apparmor=0, security=XXXX`` (where ``XXXX`` is valid security module), on the
Dindex.rst6 various security checks to be hooked by new kernel extensions. The name
10 ``"security=..."`` kernel command line argument, in the case where multiple
14 (MAC) extensions which provide a comprehensive security policy. Examples
25 A list of the active security modules can be found by reading
26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
32 Process attributes associated with "major" security modules should
34 A security module may maintain a module specific subdirectory there,
36 security module and contains all its special files. The files directly
/Linux-v5.15/Documentation/process/
Dembargoed-hardware-issues.rst9 Hardware issues which result in security problems are a different category
10 of security bugs than pure software bugs which only affect the Linux
25 The Linux kernel hardware security team is separate from the regular Linux
26 kernel security team.
28 The team only handles the coordination of embargoed hardware security
29 issues. Reports of pure software security bugs in the Linux kernel are not
31 Linux kernel security team (:ref:`Documentation/admin-guide/
34 The team can be contacted by email at <hardware-security@kernel.org>. This
35 is a private list of security officers who will help you to coordinate an
43 - PGP: https://www.kernel.org/static/files/hardware-security.asc
[all …]
/Linux-v5.15/Documentation/ABI/testing/
Dprocfs-attr-current2 Contact: linux-security-module@vger.kernel.org,
5 Description: The current security information used by a Linux
6 security module (LSM) that is active on the system.
8 this interface and hence obtain the security state
13 this interface and hence change the security state of
Dprocfs-attr-exec2 Contact: linux-security-module@vger.kernel.org,
5 Description: The security information to be used on the process
6 by a Linux security module (LSM) active on the system
9 this interface and hence obtain the security state
14 this interface and hence change the security state of
Devm1 What: security/evm
5 EVM protects a file's security extended attributes(xattrs)
8 value as the extended attribute 'security.evm'.
10 EVM supports two classes of security.evm. The first is
84 or validate the 'security.evm' xattr, but returns
91 Documentation/security/keys/trusted-encrypted.rst. Both
96 What: security/integrity/evm/evm_xattrs
/Linux-v5.15/drivers/acpi/nfit/
DKconfig18 bool "Enable debug for NVDIMM security commands"
22 other security features. The payloads for the commands that
24 security material. Disable debug of those command payloads
26 on NVDIMM security enabling say Y, otherwise say N.
/Linux-v5.15/Documentation/filesystems/caching/
Dcachefiles.rst25 (*) A note on security.
294 CacheFiles is implemented to deal properly with the LSM security features of
299 security context that is not appropriate for accessing the cache - either
304 The way CacheFiles works is to temporarily change the security context (fsuid,
305 fsgid and actor security label) that the process acts as - without changing the
306 security context of the process when it the target of an operation performed by
312 (1) Finds the security label attached to the root cache directory and uses
313 that as the security label with which it will create files. By default,
318 (2) Finds the security label of the process which issued the bind request
323 and asks LSM to supply a security ID as which it should act given the
[all …]
/Linux-v5.15/Documentation/translations/zh_CN/admin-guide/
Dsecurity-bugs.rst3 :Original: :doc:`../../../admin-guide/security-bugs`
18 可以通过电子邮件<security@kernel.org>联系Linux内核安全团队。这是一个安全人员
61 <http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists>。
/Linux-v5.15/fs/9p/
DKconfig39 implemented by security modules like SELinux. This option
40 enables an extended attribute handler for file security
43 If you are not using a security module that requires using
44 extended attributes for file security labels, say N.
/Linux-v5.15/fs/ext2/
DKconfig37 implemented by security modules like SELinux. This option
38 enables an extended attribute handler for file security
41 If you are not using a security module that requires using
42 extended attributes for file security labels, say N.
/Linux-v5.15/Documentation/translations/zh_TW/admin-guide/
Dsecurity-bugs.rst5 :Original: :doc:`../../../admin-guide/security-bugs`
21 可以通過電子郵件<security@kernel.org>聯繫Linux內核安全團隊。這是一個安全人員
64 <http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists>。
/Linux-v5.15/drivers/gpu/drm/i915/gt/
Dgen6_engine_cs.c232 u32 security; in gen6_emit_bb_start() local
235 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start()
237 security = 0; in gen6_emit_bb_start()
243 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start()
254 u32 security; in hsw_emit_bb_start() local
257 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start()
259 security = 0; in hsw_emit_bb_start()
265 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
/Linux-v5.15/fs/ceph/
DKconfig46 implemented by security modules like SELinux. This option
47 enables an extended attribute handler for file security
50 If you are not using a security module that requires using
51 extended attributes for file security labels, say N.

12345678910>>...16