| /kernel/linux/linux-5.10/drivers/memory/tegra/ |
| D | tegra186.c | 25 unsigned int security; member 47 u32 override, security; in tegra186_mc_program_sid() local 50 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 52 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid() 53 client->name, override, security); in tegra186_mc_program_sid() 60 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 62 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid() 63 client->name, override, security); in tegra186_mc_program_sid() 74 .security = 0x004, 81 .security = 0x074, [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/ |
| D | lsm.rst | 2 Linux Security Modules: General Security Hooks for Linux 16 In March 2001, the National Security Agency (NSA) gave a presentation 17 about Security-Enhanced Linux (SELinux) at the 2.5 Linux Kernel Summit. 20 implemented as its own particular kernel patch. Several other security 25 patch to support its security needs. 28 remarks that described a security framework he would be willing to 30 general framework that would provide a set of security hooks to control 31 operations on kernel objects and a set of opaque security fields in 32 kernel data structures for maintaining security attributes. This 34 desired model of security. Linus also suggested the possibility of [all …]
|
| /kernel/linux/linux-4.19/Documentation/ |
| D | lsm.txt | 2 Linux Security Modules: General Security Hooks for Linux 16 In March 2001, the National Security Agency (NSA) gave a presentation 17 about Security-Enhanced Linux (SELinux) at the 2.5 Linux Kernel Summit. 20 implemented as its own particular kernel patch. Several other security 25 patch to support its security needs. 28 remarks that described a security framework he would be willing to 30 general framework that would provide a set of security hooks to control 31 operations on kernel objects and a set of opaque security fields in 32 kernel data structures for maintaining security attributes. This 34 desired model of security. Linus also suggested the possibility of [all …]
|
| /kernel/linux/linux-4.19/drivers/memory/tegra/ |
| D | tegra186.c | 26 unsigned int security; member 36 .security = 0x004, 43 .security = 0x074, 50 .security = 0x0ac, 57 .security = 0x0b4, 64 .security = 0x0e4, 71 .security = 0x0fc, 78 .security = 0x13c, 85 .security = 0x15c, 92 .security = 0x18c, [all …]
|
| /kernel/linux/linux-5.10/security/ |
| D | Kconfig | 3 # Security configuration 6 menu "Security options" 8 source "security/keys/Kconfig" 22 config SECURITY config 23 bool "Enable different security models" 27 This allows you to choose different security modules to be 30 If this option is not selected, the default Linux security 36 depends on SECURITY 44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM). 49 bool "Socket and Networking Security Hooks" [all …]
|
| /kernel/linux/linux-4.19/security/ |
| D | Kconfig | 2 # Security configuration 5 menu "Security options" 7 source security/keys/Kconfig 21 config SECURITY config 22 bool "Enable different security models" 26 This allows you to choose different security modules to be 29 If this option is not selected, the default Linux security 35 depends on SECURITY 49 bool "Socket and Networking Security Hooks" 50 depends on SECURITY [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | lsm_hooks.h | 2 * Linux Security Module interfaces 28 #include <linux/security.h> 33 * union security_list_options - Linux Security Module hook function list 35 * Security hooks for program execution operations. 38 * If the setup in prepare_exec_creds did not setup @bprm->cred->security 40 * @bprm->cred->security to be what commit_creds needs to install for the 42 * (e.g. for transitions between security domains). 55 * between security domains). 64 * begin. It allows a check against the @bprm->cred->security value 71 * Prepare to install the new security attributes of a process being [all …]
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | lsm_hooks.h | 2 * Linux Security Module interfaces 28 #include <linux/security.h> 33 * union security_list_options - Linux Security Module hook function list 35 * Security hooks for program execution operations. 38 * Save security information in the bprm->security field, typically based 41 * transitions between security domains). 44 * checking to see if @bprm->security is non-NULL. If so, then the hook 45 * may decide either to retain the security information saved earlier or 55 * begin. It allows a check the @bprm->security value which is set in the 63 * Prepare to install the new security attributes of a process being [all …]
|
| /kernel/linux/linux-5.10/Documentation/driver-api/nvdimm/ |
| D | security.rst | 2 NVDIMM Security 9 specification [1], security DSMs are introduced. The spec added the following 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 12 data structure has been added to struct dimm in order to support the security 17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For 19 /sys/devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0012:00/ndbus0/nmem0/security 21 The "show" attribute of that attribute will display the security state for 23 frozen, and overwrite. If security is not supported, the sysfs attribute 27 in order to support some of the security functionalities: 29 disable <keyid> - disable enabled security and remove key. [all …]
|
| /kernel/linux/linux-4.19/Documentation/netlabel/ |
| D | lsm_interface.txt | 1 NetLabel Linux Security Module Interface 9 NetLabel is a mechanism which can set and retrieve security attributes from 12 The NetLabel security module API is defined in 'include/net/netlabel.h' but a 15 * NetLabel Security Attributes 18 it uses the concept of security attributes to refer to the packet's security 19 labels. The NetLabel security attributes are defined by the 21 NetLabel subsystem converts the security attributes to and from the correct 24 security attributes into whatever security identifiers are in use for their 38 label and the internal LSM security identifier can be time consuming. The 41 LSM has received a packet, used NetLabel to decode its security attributes, [all …]
|
| D | introduction.txt | 9 NetLabel is a mechanism which can be used by kernel security modules to attach 10 security attributes to outgoing network packets generated from user space 11 applications and read security attributes from incoming network packets. It 13 layer, and the kernel security module API. 18 network packet's security attributes. If any translation between the network 19 security attributes and those on the host are required then the protocol 22 the NetLabel kernel security module API described below. 36 * Security Module API 38 The purpose of the NetLabel security module API is to provide a protocol 40 to protocol independence, the security module API is designed to be completely [all …]
|
| /kernel/linux/linux-4.19/Documentation/admin-guide/ |
| D | security-bugs.rst | 3 Security bugs 6 Linux kernel developers take security very seriously. As such, we'd 7 like to know when a security bug is found so that it can be fixed and 8 disclosed as quickly as possible. Please report security bugs to the 9 Linux kernel security team. 14 The Linux kernel security team can be contacted by email at 15 <security@kernel.org>. This is a private list of security officers 19 security team will bring in extra help from area maintainers to 20 understand and fix the security vulnerability. 32 The security list is not a disclosure channel. For that, see Coordination [all …]
|
| /kernel/linux/linux-5.10/Documentation/netlabel/ |
| D | lsm_interface.rst | 2 NetLabel Linux Security Module Interface 12 NetLabel is a mechanism which can set and retrieve security attributes from 15 The NetLabel security module API is defined in 'include/net/netlabel.h' but a 18 NetLabel Security Attributes 22 it uses the concept of security attributes to refer to the packet's security 23 labels. The NetLabel security attributes are defined by the 25 NetLabel subsystem converts the security attributes to and from the correct 28 security attributes into whatever security identifiers are in use for their 44 label and the internal LSM security identifier can be time consuming. The 47 LSM has received a packet, used NetLabel to decode its security attributes, [all …]
|
| D | introduction.rst | 12 NetLabel is a mechanism which can be used by kernel security modules to attach 13 security attributes to outgoing network packets generated from user space 14 applications and read security attributes from incoming network packets. It 16 layer, and the kernel security module API. 22 network packet's security attributes. If any translation between the network 23 security attributes and those on the host are required then the protocol 26 the NetLabel kernel security module API described below. 41 Security Module API 44 The purpose of the NetLabel security module API is to provide a protocol 46 to protocol independence, the security module API is designed to be completely [all …]
|
| /kernel/linux/linux-5.10/Documentation/process/ |
| D | embargoed-hardware-issues.rst | 9 Hardware issues which result in security problems are a different category 10 of security bugs than pure software bugs which only affect the Linux 25 The Linux kernel hardware security team is separate from the regular Linux 26 kernel security team. 28 The team only handles the coordination of embargoed hardware security 29 issues. Reports of pure software security bugs in the Linux kernel are not 31 Linux kernel security team (:ref:`Documentation/admin-guide/ 34 The team can be contacted by email at <hardware-security@kernel.org>. This 35 is a private list of security officers who will help you to coordinate an 43 - PGP: https://www.kernel.org/static/files/hardware-security.asc [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | security-bugs.rst | 3 Security bugs 6 Linux kernel developers take security very seriously. As such, we'd 7 like to know when a security bug is found so that it can be fixed and 8 disclosed as quickly as possible. Please report security bugs to the 9 Linux kernel security team. 14 The Linux kernel security team can be contacted by email at 15 <security@kernel.org>. This is a private list of security officers 19 security team will bring in extra help from area maintainers to 20 understand and fix the security vulnerability. 39 The security list is not a disclosure channel. For that, see Coordination [all …]
|
| /kernel/linux/linux-5.10/security/integrity/evm/ |
| D | Kconfig | 11 EVM protects a file's security extended attributes against 37 In addition to the original security xattrs (eg. security.selinux, 38 security.SMACK64, security.capability, and security.ima) included 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 41 security.SMACK64MMAP. 56 /sys/kernel/security/integrity/evm/evm_xattrs.
|
| /kernel/linux/linux-4.19/security/integrity/evm/ |
| D | Kconfig | 10 EVM protects a file's security extended attributes against 36 In addition to the original security xattrs (eg. security.selinux, 37 security.SMACK64, security.capability, and security.ima) included 39 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 40 security.SMACK64MMAP. 55 /sys/kernel/security/integrity/evm/evm_xattrs.
|
| /kernel/liteos_a/security/ |
| D | Kconfig | 1 config SECURITY config 2 bool "Enable Security Module" 5 This option will enable security module. This is a basic feature, 11 depends on SECURITY 19 depends on SECURITY 25 bool "Enable security boot" 27 depends on SECURITY 29 This option will enable security boot.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/LSM/ |
| D | index.rst | 2 Linux Security Module Usage 5 The Linux Security Module (LSM) framework provides a mechanism for 6 various security checks to be hooked by new kernel extensions. The name 10 ``"security=..."`` kernel command line argument, in the case where multiple 14 (MAC) extensions which provide a comprehensive security policy. Examples 25 A list of the active security modules can be found by reading 26 ``/sys/kernel/security/lsm``. This is a comma separated list, and 32 Process attributes associated with "major" security modules should 34 A security module may maintain a module specific subdirectory there, 36 security module and contains all its special files. The files directly
|
| /kernel/linux/linux-5.10/security/selinux/ |
| D | xfrm.c | 3 * NSA Security-Enhanced Linux (SELinux) security module 29 * 3. Testing addition of sk_policy's with security context via setsockopt 33 #include <linux/security.h> 63 * Returns true if the xfrm contains a security blob for SELinux. 67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 71 * Allocates a xfrm_sec_state and populates it using the supplied security 182 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 183 if (x->security) in selinux_xfrm_state_pol_flow_match() 190 if (!x->security) in selinux_xfrm_state_pol_flow_match() 198 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match() [all …]
|
| /kernel/linux/linux-4.19/security/selinux/ |
| D | xfrm.c | 2 * NSA Security-Enhanced Linux (SELinux) security module 32 * 3. Testing addition of sk_policy's with security context via setsockopt 36 #include <linux/security.h> 66 * Returns true if the xfrm contains a security blob for SELinux. 70 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 74 * Allocates a xfrm_sec_state and populates it using the supplied security 185 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 186 if (x->security) in selinux_xfrm_state_pol_flow_match() 193 if (!x->security) in selinux_xfrm_state_pol_flow_match() 201 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match() [all …]
|
| /kernel/linux/linux-5.10/fs/cachefiles/ |
| D | security.c | 2 /* CacheFiles security management 13 * determine the security context within which we access the cache from within 33 pr_err("Security denies permission to nominate security context: error %d\n", in cachefiles_get_security_ID() 56 pr_err("Security denies permission to make dirs: error %d", in cachefiles_check_cache_dir() 63 pr_err("Security denies permission to create files: error %d", in cachefiles_check_cache_dir() 70 * check the security details of the on-disk cache 71 * - must be called with security override in force 72 * - must return with a security override in force - even in the case of an 92 /* use the cache root dir's security context as the basis with in cachefiles_determine_cache_security()
|
| /kernel/linux/linux-4.19/security/tomoyo/ |
| D | securityfs_if.c | 3 * security/tomoyo/securityfs_if.c 8 #include <linux/security.h> 28 * tomoyo_write_self - write() for /sys/kernel/security/tomoyo/self_domain interface. 75 cred->security; in tomoyo_write_self() 76 cred->security = new_domain; in tomoyo_write_self() 92 * tomoyo_read_self - read() for /sys/kernel/security/tomoyo/self_domain interface. 118 /* Operations for /sys/kernel/security/tomoyo/self_domain interface. */ 125 * tomoyo_open - open() for /sys/kernel/security/tomoyo/ interface. 140 * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. 152 * tomoyo_poll - poll() for /sys/kernel/security/tomoyo/ interface. [all …]
|
| /kernel/linux/linux-4.19/Documentation/filesystems/caching/ |
| D | cachefiles.txt | 21 (*) Security model and SELinux. 23 (*) A note on security. 311 SECURITY MODEL AND SELINUX 314 CacheFiles is implemented to deal properly with the LSM security features of 319 security context that is not appropriate for accessing the cache - either 324 The way CacheFiles works is to temporarily change the security context (fsuid, 325 fsgid and actor security label) that the process acts as - without changing the 326 security context of the process when it the target of an operation performed by 332 (1) Finds the security label attached to the root cache directory and uses 333 that as the security label with which it will create files. By default, [all …]
|