Searched refs:security (Results 201 - 225 of 389) sorted by relevance

1234567891011>>

/linux-master/arch/xtensa/kernel/
H A Dptrace.c26 #include <linux/security.h>
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/
H A Dtrx.h665 u32 security:3; member in struct:rx_desc
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/
H A Dtrx.h729 u32 security:3; member in struct:rx_desc_88e
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/
H A Dtrx.h461 u32 security:3; member in struct:rx_desc_8723e
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8723be/
H A Dtrx.h574 u32 security:3; member in struct:rx_desc_8723be
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/
H A Dtrx.h580 u32 security:3; member in struct:rx_desc_8821ae
/linux-master/kernel/debug/
H A Ddebug_core.c55 #include <linux/security.h>
/linux-master/net/
H A Dcompat.c25 #include <linux/security.h>
/linux-master/kernel/
H A Dwatch_queue.c24 #include <linux/security.h>
/linux-master/fs/
H A Dreaddir.c19 #include <linux/security.h>
/linux-master/drivers/net/ieee802154/
H A Dca8210.c392 * struct secspec: security specification for SAP commands
1424 * @security: Pointer to Security Structure or NULL
1438 struct secspec *security,
1473 if (!security || security->security_level == 0) {
1477 *psec = *security;
1790 dev_dbg(&priv->spi->dev, "security level: %#03x\n", hdr.sec.level);
1429 mcps_data_request( u8 src_addr_mode, u8 dst_address_mode, u16 dst_pan_id, union macaddr *dst_addr, u8 msdu_length, u8 *msdu, u8 msdu_handle, u8 tx_options, struct secspec *security, void *device_ref ) argument
/linux-master/drivers/net/ppp/
H A Dpptp.c27 #include <linux/security.h>
/linux-master/fs/proc/
H A Dkcore.c33 #include <linux/security.h>
/linux-master/drivers/acpi/
H A Dtables.c23 #include <linux/security.h>
/linux-master/drivers/thunderbolt/
H A Ddomain.c273 static DEVICE_ATTR_RO(security);
455 tb_dbg(tb, "security level set to %s\n",
/linux-master/fs/exfat/
H A Dfile.c12 #include <linux/security.h>
432 * The security check is questionable... We single
433 * out the RO attribute for checking by the security
/linux-master/fs/debugfs/
H A Dinode.c29 #include <linux/security.h>
/linux-master/arch/powerpc/kernel/
H A Dtime.c46 #include <linux/security.h>
/linux-master/drivers/net/wireless/realtek/rtl8xxxu/
H A Drtl8xxxu.h141 u32 security:3; member in struct:rtl8xxxu_rxdesc16
210 u32 security:3;
281 u32 security:3; member in struct:rtl8xxxu_rxdesc24
347 u32 security:3;
/linux-master/fs/gfs2/
H A Dglops.c13 #include <linux/security.h>
/linux-master/drivers/platform/x86/intel/
H A Dtpmi.c58 #include <linux/security.h>
807 * Allow debugfs when security policy allows. Everything this debugfs
/linux-master/drivers/cxl/
H A Dcxlmem.h167 C(SECURITY, -ENXIO, "not valid in the current security state"), \
252 /* Device enabled security commands */
364 * struct cxl_security_state - Device security state
366 * @state: state of last security operation
367 * @enabled_cmds: All security commands enabled in the CEL
469 * @security: security driver state info
500 struct cxl_security_state security; member in struct:cxl_memdev_state
/linux-master/arch/powerpc/mm/book3s64/
H A Dslice.c22 #include <linux/security.h>
/linux-master/mm/
H A Dutil.c12 #include <linux/security.h>
/linux-master/fs/bcachefs/
H A Dfs-ioctl.c16 #include <linux/security.h>

Completed in 421 milliseconds

1234567891011>>