| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0143-shim_lock-Only-skip-loading-shim_lock-verifier-with-.patch | 4 Subject: [PATCH] shim_lock: Only skip loading shim_lock verifier with explicit 7 Commit 32ddc42c (efi: Only register shim_lock verifier if shim_lock 12 Under Secure Boot enforce loading shim_lock verifier. Allow skipping 13 shim_lock verifier if SecureBoot/MokSBState EFI variables indicate 16 Fixes: 132ddc42c (efi: Only register shim_lock verifier if shim_lock 41 boot and the shim. This functionality is provided by the shim_lock verifier. It 44 +enabled. The @samp{shim_lock} variable is set to @samp{y} when shim_lock verifier 119 + N_("disable shim_lock verifier"), 0 }, \ 196 …ble-shim-lock", GRUB_INSTALL_OPTIONS_DISABLE_SHIM_LOCK, 0, 0, N_("disable shim_lock verifier"), 0},
|
| H A D | 0037-efi-Lockdown-the-GRUB-when-the-UEFI-Secure-Boot-is-e.patch | 33 - /* Register the shim_lock verifier if UEFI Secure Boot is enabled. */ 36 + * Lockdown the GRUB and register the shim_lock verifier
|
| H A D | 0038-efi-Use-grub_is_lockdown-instead-of-hardcoding-a-dis.patch | 13 also properly separate the concerns. Since the shim_lock verifier logic 42 @@ -5752,12 +5755,12 @@ boot and the shim. This functionality is provided by the shim_lock verifier… 51 -shim_lock verifier logic.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-bsp/grub/files/ |
| H A D | CVE-2022-28735-kern-efi-sb-Reject-non-kernel-files-in-the-shim_lock.patch | 5 verifier 12 lockdown verifier, but this is the minimal patch addressing 13 security concerns where the TPM verifier was able to mark modules 14 as verified (or the OpenPGP verifier for that matter), when it
|
| /OK3568_Linux_fs/kernel/Documentation/bpf/ |
| H A D | bpf_design_QA.rst | 90 Q: What are the verifier limits? 94 program can have. The verifier has various internal limits. 100 calls, a limit to the number of the verifier states per instruction, 104 to be rejected. The verifier used to recognize only pointer + constant 108 The verifier is steadily getting 'smarter'. The limits are 110 be accepted by the verifier is to try to load it. 183 compiling a program. Furthermore, the verifier can now mark the 191 enable zext insertion in the verifier). 194 support for zext. In that case, if verifier zext insertion is enabled, 214 space, but the verifier computes the actual amount of stack used
|
| H A D | ringbuf.rst | 49 infrastructure that has to be built for observability and verifier support. It 98 submit records of the length that's not known to verifier beforehand. It also 107 be reserved, such that verifier can verify that BPF program can't access memory 118 Each reserved record is tracked by verifier through existing 175 header. This significantly simplifies verifier, as well as improving API
|
| H A D | bpf_lsm.rst | 90 the BPF verifier to update the offsets for the access at runtime using the 91 :doc:`/bpf/btf` information. Since the BPF verifier is aware of the types, it
|
| H A D | bpf_devel_QA.rst | 219 Q: I made a BPF verifier change, do I need to add test cases for 222 A: If the patch has changes to the behavior of the verifier, then yes, 231 affect prior use-cases. Thus, treat those test cases as: verifier 422 To run the verifier tests:: 426 The verifier tests print out all the current checks being 463 existing ones are adapted to verifier changes e.g. due to verifier 528 generation back end or about LLVM generated code that the verifier 637 into these structures is verified by the BPF verifier and may result
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/ |
| H A D | Makefile | 431 verifier/tests.h: verifier/*.c 432 $(shell ( cd verifier/; \ 437 ) > verifier/tests.h) 438 $(OUTPUT)/test_verifier: test_verifier.c verifier/tests.h $(BPFOBJ) | $(OUTPUT) 466 prog_tests/tests.h map_tests/tests.h verifier/tests.h \
|
| H A D | README.rst | 24 // the instructions below will not be seen in the verifier log 29 The verifier will reject such code with above error. 32 verifier to understand such speculative pointer arithmetic.
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | srp.h | 130 char **verifier, const char *N, const char *g); 132 BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|
| /OK3568_Linux_fs/u-boot/net/ |
| H A D | nfs.c | 445 rpc_pkt.u.reply.verifier || in rpc_lookup_reply() 475 rpc_pkt.u.reply.verifier || in nfs_mount_reply() 501 rpc_pkt.u.reply.verifier || in nfs_umountall_reply() 525 rpc_pkt.u.reply.verifier || in nfs_lookup_reply() 624 rpc_pkt.u.reply.verifier || in nfs_readlink_reply() 671 rpc_pkt.u.reply.verifier || in nfs_read_reply()
|
| H A D | nfs.h | 73 uint32_t verifier; member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/scripts/ |
| H A D | sign_encrypt.py | 266 verifier = pss.new(key) 268 verifier = pkcs1_15.new(key) 270 verifier.verify(h, sig)
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/scripts/ |
| H A D | sign_encrypt.py | 266 verifier = pss.new(key) 268 verifier = pkcs1_15.new(key) 270 verifier.verify(h, sig)
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | filter.rst | 840 An in-kernel eBPF verifier is used to validate internal BPF programs. 871 Safety of internal BPF can come from a verifier (TBD). In such use cases as 1059 eBPF verifier 1073 If verifier sees an insn that does R2=R1, then R2 has now type 1077 (In 'secure' mode verifier will reject any type of pointer arithmetic to make 1115 A callback is used to customize verifier to restrict eBPF program access to only 1123 If R6=PTR_TO_CTX, via is_valid_access() callback the verifier will know 1125 the verifier will reject the program. 1130 The verifier will allow eBPF program to read data from stack only after 1133 Classic BPF verifier does similar check with M[0-15] memory slots. [all …]
|
| /OK3568_Linux_fs/kernel/fs/nfs/ |
| H A D | nfs3xdr.c | 273 static __be32 *xdr_encode_cookieverf3(__be32 *p, const __be32 *verifier) in xdr_encode_cookieverf3() argument 275 memcpy(p, verifier, NFS3_COOKIEVERFSIZE); in xdr_encode_cookieverf3() 279 static int decode_cookieverf3(struct xdr_stream *xdr, __be32 *verifier) in decode_cookieverf3() argument 286 memcpy(verifier, p, NFS3_COOKIEVERFSIZE); in decode_cookieverf3() 295 static void encode_createverf3(struct xdr_stream *xdr, const __be32 *verifier) in encode_createverf3() argument 300 memcpy(p, verifier, NFS3_CREATEVERFSIZE); in encode_createverf3() 303 static int decode_writeverf3(struct xdr_stream *xdr, struct nfs_write_verifier *verifier) in decode_writeverf3() argument 310 memcpy(verifier->data, p, NFS3_WRITEVERFSIZE); in decode_writeverf3() 1026 encode_createverf3(xdr, args->verifier); in encode_createhow3() 1699 if (decode_writeverf3(xdr, &result->verf->verifier)) in decode_write3resok() [all …]
|
| H A D | nfs42proc.c | 235 memcpy(&res->write_res.verifier, ©->verf, sizeof(copy->verf)); in handle_async_copy() 261 if (nfs_write_verifier_cmp(&res->write_res.verifier.verifier, in process_copy_commit() 262 &cres.verf->verifier)) { in process_copy_commit() 345 nfs_write_verifier_cmp(&res->write_res.verifier.verifier, in _nfs42_proc_copy() 346 &res->commit_res.verf->verifier)) { in _nfs42_proc_copy() 359 res->write_res.verifier.committed != NFS_FILE_SYNC) { in _nfs42_proc_copy()
|
| H A D | nfstrace.h | 1124 __array(char, verifier, NFS4_VERIFIER_SIZE) 1139 memcpy(__entry->verifier, 1140 &verf->verifier, 1157 __print_hex_str(__entry->verifier, NFS4_VERIFIER_SIZE) 1259 __array(char, verifier, NFS4_VERIFIER_SIZE) 1272 memcpy(__entry->verifier, 1273 &verf->verifier, 1288 __print_hex_str(__entry->verifier, NFS4_VERIFIER_SIZE)
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | nfs_xdr.h | 465 nfs4_verifier verifier; /* EXCLUSIVE */ member 635 struct nfs_write_verifier verifier; member 899 __be32 verifier[2]; member 1121 nfs4_verifier verifier; member 1131 nfs4_verifier verifier; member 1304 nfs4_verifier verifier; member 1451 struct nfs_writeverf verifier; member
|
| /OK3568_Linux_fs/kernel/tools/bpf/bpftool/Documentation/ |
| H A D | common_options.rst | 21 logs from libbpf as well as from the verifier, when attempting to
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/lib/gcc/arm-none-linux-gnueabihf/10.3.1/plugin/include/ |
| H A D | timevar.def | 115 DEFTIMEVAR (TV_CFG_VERIFY , "CFG verifier") 213 DEFTIMEVAR (TV_TREE_SSA_VERIFY , "tree SSA verifier") 214 DEFTIMEVAR (TV_TREE_STMT_VERIFY , "tree STMT verifier") 222 DEFTIMEVAR (TV_CGRAPH_VERIFY , "callgraph verifier")
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/lib/gcc/aarch64-none-linux-gnu/10.3.1/plugin/include/ |
| H A D | timevar.def | 115 DEFTIMEVAR (TV_CFG_VERIFY , "CFG verifier") 213 DEFTIMEVAR (TV_TREE_SSA_VERIFY , "tree SSA verifier") 214 DEFTIMEVAR (TV_TREE_STMT_VERIFY , "tree STMT verifier") 222 DEFTIMEVAR (TV_CGRAPH_VERIFY , "callgraph verifier")
|
| /OK3568_Linux_fs/kernel/kernel/bpf/ |
| H A D | Makefile | 9 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o tnum.o bpf_iter.o map_iter.o ta…
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/netronome/nfp/ |
| H A D | Makefile | 62 bpf/verifier.o \
|