/linux-master/drivers/platform/x86/intel/ |
H A D | tpmi.c | 58 #include <linux/security.h> 782 * Allow debugfs when security policy allows. Everything this debugfs
|
/linux-master/mm/ |
H A D | util.c | 12 #include <linux/security.h>
|
H A D | mprotect.c | 18 #include <linux/security.h>
|
/linux-master/drivers/acpi/ |
H A D | tables.c | 23 #include <linux/security.h>
|
/linux-master/drivers/thunderbolt/ |
H A D | domain.c | 273 static DEVICE_ATTR_RO(security); 455 tb_dbg(tb, "security level set to %s\n",
|
/linux-master/fs/debugfs/ |
H A D | inode.c | 29 #include <linux/security.h>
|
/linux-master/drivers/cxl/ |
H A D | cxlmem.h | 167 C(SECURITY, -ENXIO, "not valid in the current security state"), \ 252 /* Device enabled security commands */ 364 * struct cxl_security_state - Device security state 366 * @state: state of last security operation 367 * @enabled_cmds: All security commands enabled in the CEL 469 * @security: security driver state info 500 struct cxl_security_state security; member in struct:cxl_memdev_state
|
/linux-master/fs/tracefs/ |
H A D | event_inode.c | 21 #include <linux/security.h>
|
/linux-master/ipc/ |
H A D | msg.c | 33 #include <linux/security.h> 158 msq->q_perm.security = NULL;
|
H A D | sem.c | 79 #include <linux/security.h> 552 sma->sem_perm.security = NULL;
|
H A D | shm.c | 37 #include <linux/security.h> 731 shp->shm_perm.security = NULL;
|
/linux-master/include/linux/ |
H A D | perf_event.h | 62 #include <linux/security.h> 831 void *security; member in struct:perf_event
|
H A D | bpf.h | 261 void *security; member in struct:bpf_map 1490 void *security; member in struct:bpf_prog_aux 1653 void *security; member in struct:bpf_token
|
/linux-master/fs/nfs/ |
H A D | super.c | 313 * Map the security flavour number to a name 703 * Display security flavor in effect for this mount 802 * of supported security flavors. In this case, nfs_mount() fabricates 803 * a security flavor list containing just AUTH_NULL. 1225 if ((old->has_sec_mnt_opts || fc->security) && 1226 security_sb_mnt_opts_compat(sb, fc->security))
|
/linux-master/net/key/ |
H A D | af_key.c | 407 /* It is user using kernel to keep track of security 795 if ((xfrm_ctx = x->security)) { 1026 /* security context */ 2018 struct xfrm_sec_ctx *xfrm_ctx = xp->security; 2194 /* security context */ 2195 if ((xfrm_ctx = xp->security)) { 2306 err = security_xfrm_policy_alloc(&xp->security, uctx, GFP_KERNEL); 3180 if ((xfrm_ctx = x->security)) { 3247 /* security context */ 3321 /* security contex [all...] |
/linux-master/fs/reiserfs/ |
H A D | inode.c | 1904 * @security: optional security context to associate with this inode 1912 struct reiserfs_security_handle *security) 2103 if (security->name) { 2105 retval = reiserfs_security_write(th, inode, security); 1906 reiserfs_new_inode(struct reiserfs_transaction_handle *th, struct inode *dir, umode_t mode, const char *symname, loff_t i_size, struct dentry *dentry, struct inode *inode, struct reiserfs_security_handle *security) argument
|
/linux-master/fs/btrfs/ |
H A D | super.c | 29 #include <linux/security.h> 2040 * We'll do the security settings in our btrfs_get_tree_super() mount 2044 security_free_mnt_opts(&fc->security); 2045 fc->security = NULL;
|
/linux-master/drivers/net/wireless/ath/wil6210/ |
H A D | txrx_edma.c | 520 int *security) 525 *security = wil_rx_status_get_security(s); 519 wil_get_netif_rx_params_edma(struct sk_buff *skb, int *cid, int *security) argument
|
/linux-master/include/net/ |
H A D | xfrm.h | 98 Q: allow to resolve security gateway? 289 struct xfrm_sec_ctx *security; member in struct:xfrm_state 548 struct xfrm_sec_ctx *security; member in struct:xfrm_policy
|
/linux-master/arch/x86/kernel/ |
H A D | vm86_32.c | 50 #include <linux/security.h>
|
H A D | ptrace.c | 18 #include <linux/security.h>
|
/linux-master/net/netlabel/ |
H A D | netlabel_unlabeled.c | 30 #include <linux/security.h> 888 * for IPv4 and IPv6, with the same LSM security context which should 939 * for IPv4 and IPv6, with the same LSM security context which should 1448 * netlbl_unlabel_getattr - Get the security attributes for an unlabled packet 1451 * @secattr: the security attributes 1454 * Determine the security attributes, if any, for an unlabled packet and return
|
/linux-master/arch/sparc/kernel/ |
H A D | ptrace_64.c | 23 #include <linux/security.h>
|
/linux-master/net/netfilter/ |
H A D | nf_conntrack_standalone.c | 11 #include <linux/security.h>
|
/linux-master/security/tomoyo/ |
H A D | common.h | 3 * security/tomoyo/common.h 256 /* Index numbers for /sys/kernel/security/tomoyo/stat interface. */ 300 /* Index numbers for /sys/kernel/security/tomoyo/ interfaces. */ 386 /* Index numbers for /sys/kernel/security/tomoyo/stat interface. */ 779 /* Structure for holding a line from /sys/kernel/security/tomoyo/ interface. */ 790 * Structure for reading/writing policy via /sys/kernel/security/tomoyo 879 /* Structure for /sys/kernel/security/tomnoyo/profile interface. */ 919 /* Structure for "struct task_struct"->security. */ 1219 return task->security + tomoyo_blob_sizes.lbs_task;
|