/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
H A D | mac.h | 73 u32 security:3; member in struct:rx_desc_92c
|
/linux-master/drivers/char/tpm/eventlog/ |
H A D | tpm2.c | 17 #include <linux/security.h>
|
H A D | acpi.c | 20 #include <linux/security.h>
|
H A D | common.c | 18 #include <linux/security.h>
|
/linux-master/arch/x86/kernel/ |
H A D | ioport.c | 7 #include <linux/security.h>
|
/linux-master/net/netfilter/ |
H A D | xt_SECMARK.c | 4 * security subsystems. 13 #include <linux/security.h> 20 MODULE_DESCRIPTION("Xtables: packet security mark modification"); 54 pr_info_ratelimited("invalid security context \'%s\'\n", 60 pr_info_ratelimited("unable to map security context \'%s\'\n", 81 strcmp(table, "security") != 0) { 82 pr_info_ratelimited("only valid in \'mangle\' or \'security\' table, not \'%s\'\n",
|
/linux-master/security/tomoyo/ |
H A D | securityfs_if.c | 3 * security/tomoyo/securityfs_if.c 8 #include <linux/security.h> 29 * tomoyo_write_self - write() for /sys/kernel/security/tomoyo/self_domain interface. 91 * tomoyo_read_self - read() for /sys/kernel/security/tomoyo/self_domain interface. 118 /* Operations for /sys/kernel/security/tomoyo/self_domain interface. */ 125 * tomoyo_open - open() for /sys/kernel/security/tomoyo/ interface. 140 * tomoyo_release - close() for /sys/kernel/security/tomoyo/ interface. 153 * tomoyo_poll - poll() for /sys/kernel/security/tomoyo/ interface. 167 * tomoyo_read - read() for /sys/kernel/security/tomoyo/ interface. 183 * tomoyo_write - write() for /sys/kernel/security/tomoy [all...] |
/linux-master/kernel/ |
H A D | audit_fsnotify.c | 19 #include <linux/security.h>
|
/linux-master/arch/powerpc/kernel/ |
H A D | sys_ppc32.c | 43 #include <linux/security.h>
|
/linux-master/arch/x86/kernel/cpu/sgx/ |
H A D | driver.c | 7 #include <linux/security.h>
|
/linux-master/fs/ |
H A D | kernel_read_file.c | 5 #include <linux/security.h>
|
/linux-master/drivers/base/firmware_loader/ |
H A D | fallback.c | 6 #include <linux/security.h>
|
/linux-master/security/apparmor/ |
H A D | resource.c | 3 * AppArmor security module 12 #include <linux/security.h>
|
/linux-master/kernel/module/ |
H A D | dups.c | 23 #include <linux/security.h>
|
/linux-master/arch/mips/kernel/ |
H A D | linux32.c | 31 #include <linux/security.h>
|
H A D | mips-mt-fpaff.c | 15 #include <linux/security.h>
|
H A D | mips-mt.c | 12 #include <linux/security.h>
|
/linux-master/net/rxrpc/ |
H A D | conn_service.c | 163 conn->security = sec;
|
H A D | conn_client.c | 84 bundle->security = call->security; 180 conn->security = bundle->security; 188 if (conn->security == &rxrpc_no_security)
|
/linux-master/block/ |
H A D | ioprio.c | 30 #include <linux/security.h> 42 * which was implicitly allowed for pid 0 by security
|
/linux-master/include/soc/tegra/ |
H A D | mc.h | 63 unsigned int security; member in struct:tegra_mc_client::__anon464::__anon467
|
/linux-master/include/linux/ |
H A D | security.h | 69 /* If capable should audit the security request */ 108 * security/lockdown/lockdown.c. 147 /* These functions are in security/commoncap.c */ 1551 int security_tun_dev_alloc_security(void **security); 1552 void security_tun_dev_free_security(void *security); 1554 int security_tun_dev_attach_queue(void *security); 1555 int security_tun_dev_attach(struct sock *sk, void *security); 1556 int security_tun_dev_open(void *security); 1739 static inline int security_tun_dev_alloc_security(void **security) argument 1744 static inline void security_tun_dev_free_security(void *security) argument 1753 security_tun_dev_attach_queue(void *security) argument 1758 security_tun_dev_attach(struct sock *sk, void *security) argument 1763 security_tun_dev_open(void *security) argument [all...] |
H A D | lsm_hook_defs.h | 112 /* Needed for inode based security check */ 354 LSM_HOOK(int, 0, tun_dev_alloc_security, void **security) 355 LSM_HOOK(void, LSM_RET_VOID, tun_dev_free_security, void *security) 357 LSM_HOOK(int, 0, tun_dev_attach_queue, void *security) 358 LSM_HOOK(int, 0, tun_dev_attach, struct sock *sk, void *security) 359 LSM_HOOK(int, 0, tun_dev_open, void *security) 400 /* key management security hooks */
|
/linux-master/security/selinux/ |
H A D | hooks.c | 3 * Security-Enhanced Linux (SELinux) security module 210 * initialise the security for the init task 221 * get the security ID of a set of credentials 257 * get the objective security ID of a task 272 * Try reloading inode security labels that have been marked as invalid. The 291 * Try reloading the inode security label. This will fail if 316 * Get the security label of an inode. 332 * Get the security label of a dentry's backing inode. 351 * As not all inode security structures are in a list, we check for 522 pr_warn("SELinux: (dev %s, type %s) has no security xatt 5593 selinux_tun_dev_alloc_security(void **security) argument 5606 selinux_tun_dev_free_security(void *security) argument 5626 selinux_tun_dev_attach_queue(void *security) argument 5634 selinux_tun_dev_attach(struct sock *sk, void *security) argument 5652 selinux_tun_dev_open(void *security) argument [all...] |
/linux-master/tools/testing/cxl/test/ |
H A D | mem.c | 603 container_of(work, typeof(*mds), security.poll_dwork.work); 606 if (mds->security.sanitize_node) 607 sysfs_notify_dirent(mds->security.sanitize_node); 608 mds->security.sanitize_active = false; 636 if (schedule_delayed_work(&mds->security.poll_dwork, 638 mds->security.sanitize_active = true; 726 * the security disabled state when the user passphrase is not set. 1479 INIT_DELAYED_WORK(&mds->security.poll_dwork, cxl_mockmem_sanitize_work);
|