/linux-master/include/linux/ |
H A D | kernel_read_file.h | 15 id(POLICY, security-policy) \
|
H A D | key.h | 7 * See Documentation/security/keys/core.rst for information on keys/keyrings. 207 void *security; /* security data for this key */ member in struct:key
|
H A D | lsm_hook_defs.h | 112 /* Needed for inode based security check */ 355 LSM_HOOK(int, 0, tun_dev_alloc_security, void **security) 356 LSM_HOOK(void, LSM_RET_VOID, tun_dev_free_security, void *security) 358 LSM_HOOK(int, 0, tun_dev_attach_queue, void *security) 359 LSM_HOOK(int, 0, tun_dev_attach, struct sock *sk, void *security) 360 LSM_HOOK(int, 0, tun_dev_open, void *security) 401 /* key management security hooks */
|
H A D | lsm_hooks.h | 29 #include <linux/security.h>
|
H A D | perf_event.h | 62 #include <linux/security.h> 828 void *security; member in struct:perf_event
|
H A D | sched.h | 1498 void *security; member in struct:task_struct
|
H A D | security.h | 69 /* If capable should audit the security request */ 108 * security/lockdown/lockdown.c. 147 /* These functions are in security/commoncap.c */ 1551 int security_tun_dev_alloc_security(void **security); 1552 void security_tun_dev_free_security(void *security); 1554 int security_tun_dev_attach_queue(void *security); 1555 int security_tun_dev_attach(struct sock *sk, void *security); 1556 int security_tun_dev_open(void *security); 1739 static inline int security_tun_dev_alloc_security(void **security) argument 1744 static inline void security_tun_dev_free_security(void *security) argument 1753 security_tun_dev_attach_queue(void *security) argument 1758 security_tun_dev_attach(struct sock *sk, void *security) argument 1763 security_tun_dev_open(void *security) argument [all...] |
/linux-master/include/net/ |
H A D | route.h | 36 #include <linux/security.h>
|
H A D | scm.h | 9 #include <linux/security.h> 49 u32 secid; /* Passed security ID */
|
H A D | sock.h | 49 #include <linux/security.h> 319 * @sk_security: used by security modules
|
H A D | xfrm.h | 98 Q: allow to resolve security gateway? 289 struct xfrm_sec_ctx *security; member in struct:xfrm_state 549 struct xfrm_sec_ctx *security; member in struct:xfrm_policy
|
/linux-master/include/rdma/ |
H A D | ib_mad.h | 578 void *security; member in struct:ib_mad_agent
|
H A D | ib_verbs.h | 1766 /* A list of all open shared QP handles. Required to enforce security 1770 void *security; member in struct:ib_qp_security
|
/linux-master/include/soc/tegra/ |
H A D | mc.h | 63 unsigned int security; member in struct:tegra_mc_client::__anon464::__anon467
|
/linux-master/init/ |
H A D | do_mounts.c | 9 #include <linux/security.h>
|
H A D | init_task.c | 205 .security = NULL,
|
H A D | main.c | 41 #include <linux/security.h>
|
/linux-master/io_uring/ |
H A D | io_uring.c | 72 #include <linux/security.h>
|
H A D | sqpoll.c | 12 #include <linux/security.h>
|
H A D | uring_cmd.c | 7 #include <linux/security.h>
|
/linux-master/ipc/ |
H A D | msg.c | 33 #include <linux/security.h> 158 msq->q_perm.security = NULL;
|
H A D | msgutil.c | 9 #include <linux/security.h> 58 msg->security = NULL;
|
H A D | sem.c | 79 #include <linux/security.h> 552 sma->sem_perm.security = NULL;
|
H A D | shm.c | 37 #include <linux/security.h> 727 shp->shm_perm.security = NULL;
|
H A D | syscall.c | 10 #include <linux/security.h>
|