Searched +full:deploy +full:- +full:docs (Results 1 – 4 of 4) sorted by relevance
| /linux/drivers/gpu/drm/ci/ |
| H A D | gitlab-ci.yml | 2 DRM_CI_PROJECT_PATH: &drm-ci-project-path mesa/mesa 3 DRM_CI_COMMIT_SHA: &drm-ci-commit-sha 02337aec715c25dae7ff2479d986f831c77fe536 6 TARGET_BRANCH: drm-next 10 DEQP_RUNNER_GIT_URL: https://gitlab.freedesktop.org/mesa/deqp-runner.git 13 FDO_UPSTREAM_REPO: helen.fornazier/linux # The repo where the git-archive daily runs 14 MESA_TEMPLATES_COMMIT: &ci-templates-commit c6aeb16f86e32525fa630fb99c66c4f3e62fc3cb 16 CI_PRE_CLONE_SCRIPT: |- 17 set -o xtrace 18 …-L --retry 4 -f --retry-all-errors --retry-delay 60 -s ${DRM_CI_PROJECT_URL}/-/raw/${DRM_CI_COMMIT… 19 bash download-git-cache.sh [all …]
|
| /linux/drivers/char/tpm/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 26 which is required to validate the PCR 0-7 values. 38 Setting this causes us to deploy a scheme which uses request 41 and interposer attacks (see tpm-security.rst). Saying Y 74 tristate "TPM Interface Specification 1.3 Interface / TPM 2.0 FIFO Interface - (SPI)" 79 non-tcg SPI master (i.e. most embedded platforms) that is compliant with the 93 tristate "TPM Interface Specification 1.3 Interface / TPM 2.0 FIFO Interface - (I2C - generic)" 105 tristate "TPM Interface Specification 1.2 Interface / TPM 2.0 FIFO Interface (MMIO - SynQuacer)" 117 tristate "TPM Interface Specification 2.0 Interface (I2C - CR50)" 126 tristate "TPM Interface Specification 1.2 Interface (I2C - Atmel)" [all …]
|
| /linux/Documentation/security/ |
| H A D | ipe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 Integrity Policy Enforcement (IPE) - Kernel Documentation 10 :doc:`IPE admin guide </admin-guide/LSM/ipe>`. 13 --------------------- 16 of a locked-down system. This system would be born-secure, and have 27 2. DM-Verity 29 Both options were carefully considered, however the choice to use DM-Verity 46 modify filesystem offline, the attacker could wipe all the xattrs - 50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if 51 offline mount occurs against the filesystem protected by dm-verity, the [all …]
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 9 attempting to use IPE. If you're looking for more developer-focused 10 documentation about IPE please see :doc:`the design docs </security/ipe>`. 13 -------- 17 mechanisms that rely on labels and paths for decision-making, IPE focuses 34 a file's origin, such as dm-verity or fs-verity, which provide a layer of 36 that trust files from a dm-verity protected device. dm-verity ensures the 38 of its contents. Similarly, fs-verity offers filesystem-level integrity 40 fs-verity. These two features cannot be turned off once established, so 50 property. The latter includes checking the roothash of a dm-verity [all …]
|