linux_dsm_epyc7002/Documentation/security
Kees Cook c9de4a82c8 docs: self-protection: rename "leak" to "exposure"
The meaning of "leak" can be both "untracked resource allocation" and
"memory content disclosure". This document's use was entirely of the
latter meaning, so avoid the confusion by using the Common Weakness
Enumeration name for this: Information Exposure (CWE-200). Additionally
adds a section on structure randomization.

Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
2016-06-09 13:23:27 -06:00
..
00-INDEX ima: new templates management mechanism 2013-10-25 17:17:04 -04:00
apparmor.txt
credentials.txt
IMA-templates.txt ima: added support for new kernel cmdline parameter ima_template_fmt 2014-10-13 08:39:02 -04:00
keys-ecryptfs.txt
keys-request-key.txt
keys-trusted-encrypted.txt keys, trusted: seal with a TPM2 authorization policy 2015-12-20 15:27:13 +02:00
keys.txt Merge branch 'keys-trust' into keys-next 2016-05-04 17:20:20 +01:00
LoadPin.txt LSM: LoadPin for kernel file loading restrictions 2016-04-21 10:47:27 +10:00
LSM.txt doc: LSM: update reference, kerneltrap.org no longer works 2014-06-19 15:15:28 +02:00
self-protection.txt docs: self-protection: rename "leak" to "exposure" 2016-06-09 13:23:27 -06:00
SELinux.txt
Smack.txt Smack: limited capability for changing process label 2015-10-19 12:06:47 -07:00
tomoyo.txt
Yama.txt Yama: remove needless CONFIG_SECURITY_YAMA_STACKED 2015-07-28 13:18:19 +10:00