Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 2938) sorted by relevance

12345678910>>...118

/OK3568_Linux_fs/kernel/drivers/memory/tegra/
H A Dtegra186.c25 unsigned int security; member
47 u32 override, security; in tegra186_mc_program_sid() local
50 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid()
52 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid()
53 client->name, override, security); in tegra186_mc_program_sid()
60 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid()
62 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid()
63 client->name, override, security); in tegra186_mc_program_sid()
74 .security = 0x004,
81 .security = 0x074,
[all …]
/OK3568_Linux_fs/kernel/Documentation/security/
H A Dlsm.rst2 Linux Security Modules: General Security Hooks for Linux
16 In March 2001, the National Security Agency (NSA) gave a presentation
17 about Security-Enhanced Linux (SELinux) at the 2.5 Linux Kernel Summit.
20 implemented as its own particular kernel patch. Several other security
25 patch to support its security needs.
28 remarks that described a security framework he would be willing to
30 general framework that would provide a set of security hooks to control
31 operations on kernel objects and a set of opaque security fields in
32 kernel data structures for maintaining security attributes. This
34 desired model of security. Linus also suggested the possibility of
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/
H A D0001-run-xtests.sh-check-whether-files-exist.patch8 mv: cannot stat '/etc/security/opasswd': No such file or directory
10 mv: cannot stat '/etc/security/opasswd-pam-xtests': No such file or directory
29 mkdir -p /etc/security
31 - cp /etc/security/$config /etc/security/$config-pam-xtests
32 + [ -f "/etc/security/$config" ] &&
33 + mv /etc/security/$config /etc/security/$config-pam-xtests
34 install -m 644 "${SRCDIR}"/$config /etc/security/$config
36 -mv /etc/security/opasswd /etc/security/opasswd-pam-xtests
37 +[ -f /etc/security/opasswd ] &&
38 + mv /etc/security/opasswd /etc/security/opasswd-pam-xtests
[all …]
/OK3568_Linux_fs/kernel/include/linux/
H A Dlsm_hooks.h2 * Linux Security Module interfaces
28 #include <linux/security.h>
33 * union security_list_options - Linux Security Module hook function list
35 * Security hooks for program execution operations.
38 * If the setup in prepare_exec_creds did not setup @bprm->cred->security
40 * @bprm->cred->security to be what commit_creds needs to install for the
42 * (e.g. for transitions between security domains).
55 * between security domains).
64 * begin. It allows a check against the @bprm->cred->security value
71 * Prepare to install the new security attributes of a process being
[all …]
/OK3568_Linux_fs/kernel/security/
H A DKconfig3 # Security configuration
6 menu "Security options"
8 source "security/keys/Kconfig"
22 config SECURITY config
23 bool "Enable different security models"
27 This allows you to choose different security modules to be
30 If this option is not selected, the default Linux security
36 depends on SECURITY
44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM).
49 bool "Socket and Networking Security Hooks"
[all …]
/OK3568_Linux_fs/device/rockchip/common/configs/
H A DConfig.in.security3 comment "Security feature depends on linux kernel"
6 comment "Security feature would use it's own initrd"
11 menu "Security"
14 bool "security feature"
15 select RK_USE_FIT_IMG # Security feature depends on FIT image
16 select RK_UBOOT_SPL # Security feature depends on U-Boot SPL loader
21 string "buildroot security ramdisk base cfg (rockchip_<cfg>_ramboot_defconfig)"
24 Base name of buildroot defconfig for security ramdisk.
31 string "security ramdisk filesystem type (cpio/cpio.gz/romfs)"
35 string "its script for FIT security ramboot image"
[all …]
/OK3568_Linux_fs/kernel/Documentation/driver-api/nvdimm/
H A Dsecurity.rst2 NVDIMM Security
9 specification [1], security DSMs are introduced. The spec added the following
10 security DSMs: "get security state", "set passphrase", "disable passphrase",
12 data structure has been added to struct dimm in order to support the security
17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For
19 /sys/devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0012:00/ndbus0/nmem0/security
21 The "show" attribute of that attribute will display the security state for
23 frozen, and overwrite. If security is not supported, the sysfs attribute
27 in order to support some of the security functionalities:
29 disable <keyid> - disable enabled security and remove key.
[all …]
/OK3568_Linux_fs/kernel/Documentation/process/
H A Dembargoed-hardware-issues.rst9 Hardware issues which result in security problems are a different category
10 of security bugs than pure software bugs which only affect the Linux
25 The Linux kernel hardware security team is separate from the regular Linux
26 kernel security team.
28 The team only handles the coordination of embargoed hardware security
29 issues. Reports of pure software security bugs in the Linux kernel are not
31 Linux kernel security team (:ref:`Documentation/admin-guide/
34 The team can be contacted by email at <hardware-security@kernel.org>. This
35 is a private list of security officers who will help you to coordinate an
43 - PGP: https://www.kernel.org/static/files/hardware-security.asc
[all …]
/OK3568_Linux_fs/kernel/Documentation/admin-guide/
H A Dsecurity-bugs.rst3 Security bugs
6 Linux kernel developers take security very seriously. As such, we'd
7 like to know when a security bug is found so that it can be fixed and
8 disclosed as quickly as possible. Please report security bugs to the
9 Linux kernel security team.
14 The Linux kernel security team can be contacted by email at
15 <security@kernel.org>. This is a private list of security officers
19 security team will bring in extra help from area maintainers to
20 understand and fix the security vulnerability.
39 The security list is not a disclosure channel. For that, see Coordination
[all …]
/OK3568_Linux_fs/kernel/Documentation/netlabel/
H A Dlsm_interface.rst2 NetLabel Linux Security Module Interface
12 NetLabel is a mechanism which can set and retrieve security attributes from
15 The NetLabel security module API is defined in 'include/net/netlabel.h' but a
18 NetLabel Security Attributes
22 it uses the concept of security attributes to refer to the packet's security
23 labels. The NetLabel security attributes are defined by the
25 NetLabel subsystem converts the security attributes to and from the correct
28 security attributes into whatever security identifiers are in use for their
44 label and the internal LSM security identifier can be time consuming. The
47 LSM has received a packet, used NetLabel to decode its security attributes,
[all …]
H A Dintroduction.rst12 NetLabel is a mechanism which can be used by kernel security modules to attach
13 security attributes to outgoing network packets generated from user space
14 applications and read security attributes from incoming network packets. It
16 layer, and the kernel security module API.
22 network packet's security attributes. If any translation between the network
23 security attributes and those on the host are required then the protocol
26 the NetLabel kernel security module API described below.
41 Security Module API
44 The purpose of the NetLabel security module API is to provide a protocol
46 to protocol independence, the security module API is designed to be completely
[all …]
/OK3568_Linux_fs/buildroot/package/ibrdtnd/
H A D0001-ibrdtnd-added-openssl-compatibility.patch13 src/security/exchange/DHProtocol.cpp | 36 ++++++++++---
14 src/security/exchange/Makefile.am | 2 +
15 src/security/exchange/openssl_compat.cpp | 62 ++++++++++++++++++++++
16 src/security/exchange/openssl_compat.h | 13 +++++
18 create mode 100644 src/security/exchange/openssl_compat.cpp
19 create mode 100644 src/security/exchange/openssl_compat.h
21 diff --git a/src/security/exchange/DHProtocol.cpp b/src/security/exchange/DHProtocol.cpp
23 --- a/src/security/exchange/DHProtocol.cpp
24 +++ b/src/security/exchange/DHProtocol.cpp
103 diff --git a/src/security/exchange/Makefile.am b/src/security/exchange/Makefile.am
[all …]
/OK3568_Linux_fs/kernel/security/selinux/
H A Dxfrm.c3 * NSA Security-Enhanced Linux (SELinux) security module
29 * 3. Testing addition of sk_policy's with security context via setsockopt
33 #include <linux/security.h>
63 * Returns true if the xfrm contains a security blob for SELinux.
67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
71 * Allocates a xfrm_sec_state and populates it using the supplied security
183 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
184 if (x->security) in selinux_xfrm_state_pol_flow_match()
191 if (!x->security) in selinux_xfrm_state_pol_flow_match()
199 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match()
[all …]
/OK3568_Linux_fs/kernel/security/integrity/evm/
H A DKconfig11 EVM protects a file's security extended attributes against
37 In addition to the original security xattrs (eg. security.selinux,
38 security.SMACK64, security.capability, and security.ima) included
40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and
41 security.SMACK64MMAP.
56 /sys/kernel/security/integrity/evm/evm_xattrs.
/OK3568_Linux_fs/device/rockchip/common/build-hooks/
H A D60-security.sh52 echo "Security: No found string $1 in $2"
110 find_string_in_config "security-system-overlay" \
113 echo "Security: finish check"
143 echo " Start building security ramboot(buildroot)"
146 DST_DIR="$RK_OUTDIR/security-ramboot"
149 echo "Rootfs is not ready, building it for security..."
157 /usr/bin/time -f "you take %E to build security initrd(buildroot)" \
161 /usr/bin/time -f "you take %E to pack security ramboot image" \
175 echo -e "security_check \tcheck contidions for security boot"
176 echo -e "createkeys \tbuild security boot keys"
[all …]
/OK3568_Linux_fs/device/rockchip/common/scripts/
H A Dmk-security.sh52 echo "Security: No found string $1 in $2"
110 find_string_in_config "security-system-overlay" \
113 echo "Security: finish check"
143 echo " Start building security ramboot(buildroot)"
146 DST_DIR="$RK_OUTDIR/security-ramboot"
149 echo "Rootfs is not ready, building it for security..."
157 /usr/bin/time -f "you take %E to build security initrd(buildroot)" \
161 /usr/bin/time -f "you take %E to pack security ramboot image" \
175 echo -e "security_check \tcheck contidions for security boot"
176 echo -e "createkeys \tbuild security boot keys"
[all …]
/OK3568_Linux_fs/kernel/Documentation/filesystems/caching/
H A Dcachefiles.rst23 (*) Security model and SELinux.
25 (*) A note on security.
291 Security Model and SELinux
294 CacheFiles is implemented to deal properly with the LSM security features of
299 security context that is not appropriate for accessing the cache - either
304 The way CacheFiles works is to temporarily change the security context (fsuid,
305 fsgid and actor security label) that the process acts as - without changing the
306 security context of the process when it the target of an operation performed by
312 (1) Finds the security label attached to the root cache directory and uses
313 that as the security label with which it will create files. By default,
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dmd2.h8 * security risk. We recommend considering stronger message digests
55 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
134 * constitutes a security risk. We recommend considering
151 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
186 * constitutes a security risk. We recommend considering
[all …]
H A Dmd4.h8 * security risk. We recommend considering stronger message digests
56 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
133 * constitutes a security risk. We recommend considering
150 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
187 * constitutes a security risk. We recommend considering
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dmd2.h8 * security risk. We recommend considering stronger message digests
55 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
134 * constitutes a security risk. We recommend considering
151 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
186 * constitutes a security risk. We recommend considering
[all …]
H A Dmd5.h8 * security risk. We recommend considering stronger message
55 * constitutes a security risk. We recommend considering
77 * constitutes a security risk. We recommend considering
89 * constitutes a security risk. We recommend considering
102 * constitutes a security risk. We recommend considering
117 * constitutes a security risk. We recommend considering
133 * constitutes a security risk. We recommend considering
150 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
187 * constitutes a security risk. We recommend considering
[all …]
H A Dmd4.h8 * security risk. We recommend considering stronger message digests
56 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
133 * constitutes a security risk. We recommend considering
150 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
187 * constitutes a security risk. We recommend considering
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dmd2.h8 * security risk. We recommend considering stronger message digests
55 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
134 * constitutes a security risk. We recommend considering
151 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
186 * constitutes a security risk. We recommend considering
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dmd2.h8 * security risk. We recommend considering stronger message digests
55 * constitutes a security risk. We recommend considering
78 * constitutes a security risk. We recommend considering
90 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
118 * constitutes a security risk. We recommend considering
134 * constitutes a security risk. We recommend considering
151 * constitutes a security risk. We recommend considering
166 * constitutes a security risk. We recommend considering
186 * constitutes a security risk. We recommend considering
[all …]
/OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/
H A Dindex.rst2 Linux Security Module Usage
5 The Linux Security Module (LSM) framework provides a mechanism for
6 various security checks to be hooked by new kernel extensions. The name
10 ``"security=..."`` kernel command line argument, in the case where multiple
14 (MAC) extensions which provide a comprehensive security policy. Examples
25 A list of the active security modules can be found by reading
26 ``/sys/kernel/security/lsm``. This is a comma separated list, and
32 Process attributes associated with "major" security modules should
34 A security module may maintain a module specific subdirectory there,
36 security module and contains all its special files. The files directly

12345678910>>...118