Searched refs:security (Results 76 - 100 of 389) sorted by relevance

1234567891011>>

/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/
H A Dmac.h73 u32 security:3; member in struct:rx_desc_92c
/linux-master/drivers/char/tpm/eventlog/
H A Dtpm2.c17 #include <linux/security.h>
H A Dacpi.c20 #include <linux/security.h>
H A Dcommon.c18 #include <linux/security.h>
/linux-master/arch/x86/kernel/
H A Dioport.c7 #include <linux/security.h>
/linux-master/net/netfilter/
H A Dxt_SECMARK.c4 * security subsystems.
13 #include <linux/security.h>
20 MODULE_DESCRIPTION("Xtables: packet security mark modification");
54 pr_info_ratelimited("invalid security context \'%s\'\n",
60 pr_info_ratelimited("unable to map security context \'%s\'\n",
81 strcmp(table, "security") != 0) {
82 pr_info_ratelimited("only valid in \'mangle\' or \'security\' table, not \'%s\'\n",
/linux-master/security/tomoyo/
H A Dsecurityfs_if.c3 * security/tomoyo/securityfs_if.c
8 #include <linux/security.h>
29 * tomoyo_write_self - write() for /sys/kernel/security/tomoyo/self_domain interface.
91 * tomoyo_read_self - read() for /sys/kernel/security/tomoyo/self_domain interface.
118 /* Operations for /sys/kernel/security/tomoyo/self_domain interface. */
125 * tomoyo_open - open() for /sys/kernel/security/tomoyo/ interface.
140 * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface.
153 * tomoyo_poll - poll() for /sys/kernel/security/tomoyo/ interface.
167 * tomoyo_read - read() for /sys/kernel/security/tomoyo/ interface.
183 * tomoyo_write - write() for /sys/kernel/security/tomoy
[all...]
/linux-master/kernel/
H A Daudit_fsnotify.c19 #include <linux/security.h>
/linux-master/arch/powerpc/kernel/
H A Dsys_ppc32.c43 #include <linux/security.h>
/linux-master/arch/x86/kernel/cpu/sgx/
H A Ddriver.c7 #include <linux/security.h>
/linux-master/fs/
H A Dkernel_read_file.c5 #include <linux/security.h>
/linux-master/drivers/base/firmware_loader/
H A Dfallback.c6 #include <linux/security.h>
/linux-master/security/apparmor/
H A Dresource.c3 * AppArmor security module
12 #include <linux/security.h>
/linux-master/kernel/module/
H A Ddups.c23 #include <linux/security.h>
/linux-master/arch/mips/kernel/
H A Dlinux32.c31 #include <linux/security.h>
H A Dmips-mt-fpaff.c15 #include <linux/security.h>
H A Dmips-mt.c12 #include <linux/security.h>
/linux-master/net/rxrpc/
H A Dconn_service.c163 conn->security = sec;
H A Dconn_client.c84 bundle->security = call->security;
180 conn->security = bundle->security;
188 if (conn->security == &rxrpc_no_security)
/linux-master/block/
H A Dioprio.c30 #include <linux/security.h>
42 * which was implicitly allowed for pid 0 by security
/linux-master/include/soc/tegra/
H A Dmc.h63 unsigned int security; member in struct:tegra_mc_client::__anon464::__anon467
/linux-master/include/linux/
H A Dsecurity.h69 /* If capable should audit the security request */
108 * security/lockdown/lockdown.c.
147 /* These functions are in security/commoncap.c */
1551 int security_tun_dev_alloc_security(void **security);
1552 void security_tun_dev_free_security(void *security);
1554 int security_tun_dev_attach_queue(void *security);
1555 int security_tun_dev_attach(struct sock *sk, void *security);
1556 int security_tun_dev_open(void *security);
1739 static inline int security_tun_dev_alloc_security(void **security) argument
1744 static inline void security_tun_dev_free_security(void *security) argument
1753 security_tun_dev_attach_queue(void *security) argument
1758 security_tun_dev_attach(struct sock *sk, void *security) argument
1763 security_tun_dev_open(void *security) argument
[all...]
H A Dlsm_hook_defs.h112 /* Needed for inode based security check */
354 LSM_HOOK(int, 0, tun_dev_alloc_security, void **security)
355 LSM_HOOK(void, LSM_RET_VOID, tun_dev_free_security, void *security)
357 LSM_HOOK(int, 0, tun_dev_attach_queue, void *security)
358 LSM_HOOK(int, 0, tun_dev_attach, struct sock *sk, void *security)
359 LSM_HOOK(int, 0, tun_dev_open, void *security)
400 /* key management security hooks */
/linux-master/security/selinux/
H A Dhooks.c3 * Security-Enhanced Linux (SELinux) security module
210 * initialise the security for the init task
221 * get the security ID of a set of credentials
257 * get the objective security ID of a task
272 * Try reloading inode security labels that have been marked as invalid. The
291 * Try reloading the inode security label. This will fail if
316 * Get the security label of an inode.
332 * Get the security label of a dentry's backing inode.
351 * As not all inode security structures are in a list, we check for
522 pr_warn("SELinux: (dev %s, type %s) has no security xatt
5593 selinux_tun_dev_alloc_security(void **security) argument
5606 selinux_tun_dev_free_security(void *security) argument
5626 selinux_tun_dev_attach_queue(void *security) argument
5634 selinux_tun_dev_attach(struct sock *sk, void *security) argument
5652 selinux_tun_dev_open(void *security) argument
[all...]
/linux-master/tools/testing/cxl/test/
H A Dmem.c603 container_of(work, typeof(*mds), security.poll_dwork.work);
606 if (mds->security.sanitize_node)
607 sysfs_notify_dirent(mds->security.sanitize_node);
608 mds->security.sanitize_active = false;
636 if (schedule_delayed_work(&mds->security.poll_dwork,
638 mds->security.sanitize_active = true;
726 * the security disabled state when the user passphrase is not set.
1479 INIT_DELAYED_WORK(&mds->security.poll_dwork, cxl_mockmem_sanitize_work);

Completed in 237 milliseconds

1234567891011>>