| /OK3568_Linux_fs/kernel/drivers/memory/tegra/ |
| H A D | tegra186.c | 25 unsigned int security; member 47 u32 override, security; in tegra186_mc_program_sid() local 50 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 53 client->name, override, security); in tegra186_mc_program_sid() 60 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 63 client->name, override, security); in tegra186_mc_program_sid() 74 .security = 0x004, 81 .security = 0x074, 88 .security = 0x0ac, 95 .security = 0x0b4, [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/ |
| H A D | 0001-run-xtests.sh-check-whether-files-exist.patch | 8 mv: cannot stat '/etc/security/opasswd': No such file or directory 10 mv: cannot stat '/etc/security/opasswd-pam-xtests': No such file or directory 29 mkdir -p /etc/security 31 - cp /etc/security/$config /etc/security/$config-pam-xtests 32 + [ -f "/etc/security/$config" ] && 33 + mv /etc/security/$config /etc/security/$config-pam-xtests 34 install -m 644 "${SRCDIR}"/$config /etc/security/$config 36 -mv /etc/security/opasswd /etc/security/opasswd-pam-xtests 37 +[ -f /etc/security/opasswd ] && 38 + mv /etc/security/opasswd /etc/security/opasswd-pam-xtests [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | lsm.rst | 20 implemented as its own particular kernel patch. Several other security 25 patch to support its security needs. 28 remarks that described a security framework he would be willing to 30 general framework that would provide a set of security hooks to control 31 operations on kernel objects and a set of opaque security fields in 32 kernel data structures for maintaining security attributes. This 34 desired model of security. Linus also suggested the possibility of 38 such a framework. LSM was a joint development effort by several security 44 security module. 50 security modules. In particular, the LSM framework is primarily focused [all …]
|
| /OK3568_Linux_fs/buildroot/package/ibrdtnd/ |
| H A D | 0001-ibrdtnd-added-openssl-compatibility.patch | 13 src/security/exchange/DHProtocol.cpp | 36 ++++++++++--- 14 src/security/exchange/Makefile.am | 2 + 15 src/security/exchange/openssl_compat.cpp | 62 ++++++++++++++++++++++ 16 src/security/exchange/openssl_compat.h | 13 +++++ 18 create mode 100644 src/security/exchange/openssl_compat.cpp 19 create mode 100644 src/security/exchange/openssl_compat.h 21 diff --git a/src/security/exchange/DHProtocol.cpp b/src/security/exchange/DHProtocol.cpp 23 --- a/src/security/exchange/DHProtocol.cpp 24 +++ b/src/security/exchange/DHProtocol.cpp 103 diff --git a/src/security/exchange/Makefile.am b/src/security/exchange/Makefile.am [all …]
|
| H A D | 0002-SecurityCertificateManager.cpp-include-cstring-267.patch | 12 src/security/SecurityCertificateManager.cpp | 1 + 15 diff --git a/src/security/SecurityCertificateManager.cpp b/src/security/SecurityCertificateManager.… 17 --- a/src/security/SecurityCertificateManager.cpp 18 +++ b/src/security/SecurityCertificateManager.cpp 20 #include "security/SecurityCertificateManager.h"
|
| /OK3568_Linux_fs/kernel/Documentation/driver-api/nvdimm/ |
| H A D | security.rst | 9 specification [1], security DSMs are introduced. The spec added the following 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 12 data structure has been added to struct dimm in order to support the security 17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For 19 /sys/devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0012:00/ndbus0/nmem0/security 21 The "show" attribute of that attribute will display the security state for 23 frozen, and overwrite. If security is not supported, the sysfs attribute 27 in order to support some of the security functionalities: 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. [all …]
|
| /OK3568_Linux_fs/yocto/meta-browser/meta-firefox/recipes-browser/firefox/firefox/porting/ |
| H A D | NSS-Fix-FTBFS-on-Hurd-because-of-MAXPATHLEN.patch | 7 security/nss/cmd/shlibsign/shlibsign.c | 21 ++++++++++++++++----- 8 security/nss/lib/freebl/unix_rand.c | 4 ++++ 11 diff --git a/security/nss/cmd/shlibsign/shlibsign.c b/security/nss/cmd/shlibsign/shlibsign.c 13 --- a/security/nss/cmd/shlibsign/shlibsign.c 14 +++ b/security/nss/cmd/shlibsign/shlibsign.c 50 diff --git a/security/nss/lib/freebl/unix_rand.c b/security/nss/lib/freebl/unix_rand.c 52 --- a/security/nss/lib/freebl/unix_rand.c 53 +++ b/security/nss/lib/freebl/unix_rand.c
|
| /OK3568_Linux_fs/device/rockchip/common/configs/ |
| H A D | Config.in.security | 14 bool "security feature" 21 string "buildroot security ramdisk base cfg (rockchip_<cfg>_ramboot_defconfig)" 24 Base name of buildroot defconfig for security ramdisk. 31 string "security ramdisk filesystem type (cpio/cpio.gz/romfs)" 35 string "its script for FIT security ramboot image" 48 prompt "security check method (DM-E|DM-V)" 60 comment "Burn security key is dangerous and cannot be reverted!" 64 bool "burn security key" 66 Burn security key's hash to non volatile memory.
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | Kconfig | 11 EVM protects a file's security extended attributes against 37 In addition to the original security xattrs (eg. security.selinux, 38 security.SMACK64, security.capability, and security.ima) included 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 41 security.SMACK64MMAP. 56 /sys/kernel/security/integrity/evm/evm_xattrs.
|
| /OK3568_Linux_fs/kernel/Documentation/netlabel/ |
| H A D | introduction.rst | 12 NetLabel is a mechanism which can be used by kernel security modules to attach 13 security attributes to outgoing network packets generated from user space 14 applications and read security attributes from incoming network packets. It 16 layer, and the kernel security module API. 22 network packet's security attributes. If any translation between the network 23 security attributes and those on the host are required then the protocol 26 the NetLabel kernel security module API described below. 44 The purpose of the NetLabel security module API is to provide a protocol 46 to protocol independence, the security module API is designed to be completely 50 Detailed information about the NetLabel security module API can be found in the
|
| H A D | lsm_interface.rst | 12 NetLabel is a mechanism which can set and retrieve security attributes from 15 The NetLabel security module API is defined in 'include/net/netlabel.h' but a 22 it uses the concept of security attributes to refer to the packet's security 23 labels. The NetLabel security attributes are defined by the 25 NetLabel subsystem converts the security attributes to and from the correct 28 security attributes into whatever security identifiers are in use for their 44 label and the internal LSM security identifier can be time consuming. The 47 LSM has received a packet, used NetLabel to decode its security attributes, 48 and translated the security attributes into a LSM internal identifier the LSM
|
| H A D | cipso_ipv4.rst | 27 label by using the NetLabel security module API; if the NetLabel "domain" is 37 NetLabel security module API to extract the security attributes of the packet. 44 The CIPSO/IPv4 protocol engine contains a mechanism to translate CIPSO security 49 different security attribute mapping table. 54 The NetLabel system provides a framework for caching security attribute
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | Kconfig | 8 source "security/keys/Kconfig" 23 bool "Enable different security models" 27 This allows you to choose different security modules to be 30 If this option is not selected, the default Linux security 44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM). 52 This enables the socket and networking security hooks. 53 If enabled, a security module can use these hooks to 61 This enables the Infiniband security hooks. 62 If enabled, a security module can use these hooks to 70 This enables the XFRM (IPSec) networking security hooks. [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | security-bugs.rst | 6 Linux kernel developers take security very seriously. As such, we'd 7 like to know when a security bug is found so that it can be fixed and 8 disclosed as quickly as possible. Please report security bugs to the 9 Linux kernel security team. 14 The Linux kernel security team can be contacted by email at 15 <security@kernel.org>. This is a private list of security officers 19 security team will bring in extra help from area maintainers to 20 understand and fix the security vulnerability. 39 The security list is not a disclosure channel. For that, see Coordination 62 information submitted to the security list and any followup discussions [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/ssiapi/ssiapi/ |
| H A D | 0004-Do-not-override-flags-coming-from-build-environment.patch | 6 e.g. we need some optimization level turned on when security flags are enabled 22 …ty=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 23 -CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 24 …sibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 25 …ty=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 26 +#CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC" 27 …sibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | xfrm.c | 67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 183 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 184 if (x->security) in selinux_xfrm_state_pol_flow_match() 191 if (!x->security) in selinux_xfrm_state_pol_flow_match() 199 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match() 224 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress() 239 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_skb_sid_ingress() 337 return selinux_xfrm_alloc_user(&x->security, uctx, GFP_KERNEL); in selinux_xfrm_state_alloc() 375 x->security = ctx; in selinux_xfrm_state_alloc_acquire() 387 selinux_xfrm_free(x->security); in selinux_xfrm_state_free() [all …]
|
| /OK3568_Linux_fs/yocto/meta-browser/meta-firefox/recipes-browser/firefox/firefox/fixes/ |
| H A D | 0002-security-Fix-build-with-glibc-2.34.patch | 4 Subject: [PATCH] security: Fix build with glibc-2.34 9 …re2-64-poky-linux/firefox/68.9.0esr-r0/firefox-68.9.0/firefox-build-dir/security/sandbox/linux/lau… 10 …/build/tmp/work/core2-64-poky-linux/firefox/68.9.0esr-r0/firefox-68.9.0/security/sandbox/linux/lau… 16 security/sandbox/linux/launch/SandboxLaunch.cpp | 12 +++++++++--- 19 diff --git a/security/sandbox/linux/launch/SandboxLaunch.cpp b/security/sandbox/linux/launch/Sandbo… 21 --- a/security/sandbox/linux/launch/SandboxLaunch.cpp 22 +++ b/security/sandbox/linux/launch/SandboxLaunch.cpp
|
| /OK3568_Linux_fs/kernel/Documentation/process/ |
| H A D | embargoed-hardware-issues.rst | 9 Hardware issues which result in security problems are a different category 10 of security bugs than pure software bugs which only affect the Linux 25 The Linux kernel hardware security team is separate from the regular Linux 26 kernel security team. 28 The team only handles the coordination of embargoed hardware security 29 issues. Reports of pure software security bugs in the Linux kernel are not 31 Linux kernel security team (:ref:`Documentation/admin-guide/ 34 The team can be contacted by email at <hardware-security@kernel.org>. This 35 is a private list of security officers who will help you to coordinate an 43 - PGP: https://www.kernel.org/static/files/hardware-security.asc [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | apparmor.rst | 8 AppArmor is MAC style security extension for the Linux kernel. It implements 19 If AppArmor should be selected as the default security module then set:: 26 If AppArmor is not the default security module it can be enabled by passing 27 ``security=apparmor`` on the kernel's command line. 29 If AppArmor is the default security module it can be disabled by passing 30 ``apparmor=0, security=XXXX`` (where ``XXXX`` is valid security module), on the
|
| H A D | index.rst | 6 various security checks to be hooked by new kernel extensions. The name 10 ``"security=..."`` kernel command line argument, in the case where multiple 14 (MAC) extensions which provide a comprehensive security policy. Examples 25 A list of the active security modules can be found by reading 26 ``/sys/kernel/security/lsm``. This is a comma separated list, and 32 Process attributes associated with "major" security modules should 34 A security module may maintain a module specific subdirectory there, 36 security module and contains all its special files. The files directly
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/libidn/libidn/ |
| H A D | 0001-idn-format-security-warnings.patch | 1 Subject: [PATCH] idn: fix printf() format security warnings 7 …c/idn.c:172:7: error: format not a string literal and no format arguments [-Werror=format-security] 10 …c/idn.c:187:5: error: format not a string literal and no format arguments [-Werror=format-security] 13 …c/idn.c:202:4: error: format not a string literal and no format arguments [-Werror=format-security] 16 …c/idn.c:220:8: error: format not a string literal and no format arguments [-Werror=format-security] 19 …c/idn.c:245:8: error: format not a string literal and no format arguments [-Werror=format-security] 22 …c/idn.c:281:6: error: format not a string literal and no format arguments [-Werror=format-security] 25 …c/idn.c:340:6: error: format not a string literal and no format arguments [-Werror=format-security] 28 …c/idn.c:364:6: error: format not a string literal and no format arguments [-Werror=format-security] 31 …c/idn.c:442:8: error: format not a string literal and no format arguments [-Werror=format-security] [all …]
|
| /OK3568_Linux_fs/buildroot/package/rpcbind/ |
| H A D | 0001-Remove-yellow-pages-support.patch | 14 src/security.c | 15 --------------- 17 diff --git a/src/security.c b/src/security.c 19 --- a/src/security.c 20 +++ b/src/security.c
|
| /OK3568_Linux_fs/buildroot/package/libpam-radius-auth/ |
| H A D | libpam-radius-auth.mk | 19 mkdir -p $(STAGING_DIR)/lib/security/ 20 cp -dpfr $(@D)/pam_radius_auth.so* $(STAGING_DIR)/lib/security/ 24 mkdir -p $(TARGET_DIR)/lib/security/ 25 cp -dpfr $(@D)/pam_radius_auth.so* $(TARGET_DIR)/lib/security/
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/caching/ |
| H A D | cachefiles.rst | 25 (*) A note on security. 294 CacheFiles is implemented to deal properly with the LSM security features of 299 security context that is not appropriate for accessing the cache - either 304 The way CacheFiles works is to temporarily change the security context (fsuid, 305 fsgid and actor security label) that the process acts as - without changing the 306 security context of the process when it the target of an operation performed by 312 (1) Finds the security label attached to the root cache directory and uses 313 that as the security label with which it will create files. By default, 318 (2) Finds the security label of the process which issued the bind request 323 and asks LSM to supply a security ID as which it should act given the [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | evm | 1 What: security/evm 5 EVM protects a file's security extended attributes(xattrs) 8 value as the extended attribute 'security.evm'. 10 EVM supports two classes of security.evm. The first is 78 or validate the 'security.evm' xattr, but returns 85 Documentation/security/keys/trusted-encrypted.rst. Both 90 What: security/integrity/evm/evm_xattrs
|