/linux-master/kernel/sched/ |
H A D | build_utility.c | 39 #include <linux/security.h>
|
/linux-master/drivers/scsi/ |
H A D | scsi_netlink.c | 9 #include <linux/security.h>
|
/linux-master/drivers/staging/rtl8723bs/include/ |
H A D | rtl8723b_recv.h | 18 u32 security:3; member in struct:rxreport_8723b
|
/linux-master/kernel/module/ |
H A D | signing.c | 14 #include <linux/security.h>
|
H A D | kmod.c | 20 #include <linux/security.h>
|
/linux-master/tools/testing/selftests/powerpc/ |
H A D | Makefile | 38 security \
|
/linux-master/include/linux/ |
H A D | lsm_hooks.h | 29 #include <linux/security.h>
|
H A D | fs_context.h | 14 #include <linux/security.h> 102 void *security; /* LSM options */ member in struct:fs_context
|
/linux-master/fs/reiserfs/ |
H A D | namei.c | 628 struct reiserfs_security_handle security; local 644 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); 660 inode, &security); 690 reiserfs_security_free(&security); 700 struct reiserfs_security_handle security; local 724 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); 740 inode, &security); 774 reiserfs_security_free(&security); 784 struct reiserfs_security_handle security; local 816 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); 1103 struct reiserfs_security_handle security; local [all...] |
H A D | xattr_security.c | 9 #include <linux/security.h> 58 /* Initializes the security context for a new inode and returns the number
|
/linux-master/drivers/cxl/core/ |
H A D | mbox.c | 3 #include <linux/security.h> 105 * disabled because they pass plain text security payloads over the 125 static void cxl_set_security_cmd_enabled(struct cxl_security_state *security, argument 130 set_bit(CXL_SEC_ENABLED_SANITIZE, security->enabled_cmds); 134 security->enabled_cmds); 138 security->enabled_cmds); 142 security->enabled_cmds); 146 security->enabled_cmds); 149 set_bit(CXL_SEC_ENABLED_UNLOCK, security->enabled_cmds); 153 security [all...] |
H A D | memdev.c | 128 unsigned long state = mds->security.state; 133 if (mds->security.sanitize_active) 554 !test_bit(CXL_SEC_ENABLED_SANITIZE, mds->security.enabled_cmds)) 558 !test_bit(CXL_SEC_ENABLED_SECURE_ERASE, mds->security.enabled_cmds)) 565 .name = "security", 1113 state = mds->security.sanitize_node; 1114 mds->security.sanitize_node = NULL; 1117 cancel_delayed_work_sync(&mds->security.poll_dwork); 1128 if (!test_bit(CXL_SEC_ENABLED_SANITIZE, mds->security.enabled_cmds)) 1135 sec = sysfs_get_dirent(cxlmd->dev.kobj.sd, "security"); [all...] |
/linux-master/fs/ |
H A D | fs_context.c | 18 #include <linux/security.h> 118 * into flag bits without going to the filesystem. The active security module 215 ret = security_sb_eat_lsm_opts(options, &fc->security); 352 * the fc->security object is inherited from @reference (if needed). 405 fc->security = NULL; 522 security_free_mnt_opts(&fc->security); 650 return security_sb_eat_lsm_opts(ctx->legacy_data, &fc->security); 743 security_free_mnt_opts(&fc->security);
|
/linux-master/security/smack/ |
H A D | smack.h | 328 return cred->security + smack_blob_sizes.lbs_cred; 344 return msg->security + smack_blob_sizes.lbs_msg_msg; 349 return ipc->security + smack_blob_sizes.lbs_ipc;
|
/linux-master/arch/x86/mm/ |
H A D | testmmiotrace.c | 11 #include <linux/security.h>
|
/linux-master/fs/sysfs/ |
H A D | symlink.c | 16 #include <linux/security.h>
|
/linux-master/drivers/infiniband/core/ |
H A D | Makefile | 17 ib_core-$(CONFIG_SECURITY_INFINIBAND) += security.o
|
/linux-master/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1) 86 echo $line | grep -q "security.ima=0x03"
|
/linux-master/drivers/pci/ |
H A D | syscall.c | 10 #include <linux/security.h>
|
/linux-master/security/apparmor/ |
H A D | capability.c | 3 * AppArmor security module 14 #include <linux/security.h>
|
/linux-master/security/lockdown/ |
H A D | lockdown.c | 13 #include <linux/security.h>
|
/linux-master/net/rxrpc/ |
H A D | conn_event.c | 243 return conn->security->respond_to_challenge(conn, skb); 246 ret = conn->security->verify_response(conn, skb); 250 ret = conn->security->init_connection_security( 279 * set up security and issue a challenge 283 if (conn->security->issue_challenge(conn) < 0)
|
/linux-master/drivers/net/ethernet/toshiba/ |
H A D | ps3_gelic_wireless.c | 402 pr_debug("%s: <- sec=%16x\n", __func__, scan->security); 403 switch (be16_to_cpu(scan->security) & GELIC_EURUS_SCAN_SEC_MASK) { 415 switch (be16_to_cpu(scan->security) & GELIC_EURUS_SCAN_SEC_WPA_MASK) { 1659 u16 security; local 1689 /* security */ 1690 security = be16_to_cpu(scan_info->hwinfo->security) & 1693 if (security == GELIC_EURUS_SCAN_SEC_WPA2) 1699 if (security == GELIC_EURUS_SCAN_SEC_WPA) 1706 if (security 1837 u16 security; local [all...] |
/linux-master/fs/ntfs3/ |
H A D | fsntfs.c | 997 * security_hash - Calculates a hash of security descriptor. 1875 struct ntfs_index *indx_sdh = &sbi->security.index_sdh; 1876 struct ntfs_index *indx_sii = &sbi->security.index_sii; 1943 sbi->security.next_id = SECURITY_ID_FIRST; 1944 /* Always write new security at the end of bucket. */ 1945 sbi->security.next_off = 1963 if (next_id >= sbi->security.next_id) 1964 sbi->security.next_id = next_id; 1967 sbi->security.ni = ni; 1977 * ntfs_get_security_by_id - Read security descripto [all...] |
/linux-master/arch/s390/include/uapi/asm/ |
H A D | vtoc.h | 46 __u8 security; /* security byte */ member in struct:vtoc_volume_label_cdl
|