/kernel/linux/linux-5.10/drivers/memory/tegra/ |
H A D | tegra186.c | 25 unsigned int security; member 47 u32 override, security; in tegra186_mc_program_sid() local 50 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 52 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid() 53 client->name, override, security); in tegra186_mc_program_sid() 60 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid() 62 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid() 63 client->name, override, security); in tegra186_mc_program_sid() [all...] |
/kernel/linux/linux-6.6/drivers/memory/tegra/ |
H A D | tegra194.c | 20 .security = 0x004, 30 .security = 0x00c, 40 .security = 0x014, 50 .security = 0x0ac, 60 .security = 0x0b4, 70 .security = 0x0e4, 80 .security = 0x0fc, 90 .security = 0x13c, 100 .security = 0x15c, 110 .security [all...] |
H A D | tegra186.c | 78 value = readl(mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override() 97 writel(value, mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override() 155 .security = 0x004, 165 .security = 0x074, 175 .security = 0x0ac, 185 .security = 0x0b4, 195 .security = 0x0e4, 205 .security = 0x0fc, 215 .security = 0x13c, 225 .security [all...] |
H A D | tegra234.c | 17 * override and security register offsets. 29 .security = 0xac, 41 .security = 0xe4, 53 .security = 0x144, 65 .security = 0x14c, 77 .security = 0x154, 89 .security = 0x15c, 99 .security = 0x164, 109 .security = 0x16c, 119 .security [all...] |
/kernel/linux/linux-5.10/security/selinux/ |
H A D | xfrm.c | 3 * NSA Security-Enhanced Linux (SELinux) security module 29 * 3. Testing addition of sk_policy's with security context via setsockopt 33 #include <linux/security.h> 63 * Returns true if the xfrm contains a security blob for SELinux. 67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 71 * Allocates a xfrm_sec_state and populates it using the supplied security 183 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 184 if (x->security) in selinux_xfrm_state_pol_flow_match() 191 if (!x->security) in selinux_xfrm_state_pol_flow_match() 199 state_sid = x->security in selinux_xfrm_state_pol_flow_match() [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | xfrm.c | 3 * Security-Enhanced Linux (SELinux) security module 29 * 3. Testing addition of sk_policy's with security context via setsockopt 33 #include <linux/security.h> 63 * Returns true if the xfrm contains a security blob for SELinux. 67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm() 71 * Allocates a xfrm_sec_state and populates it using the supplied security 180 if (!xp->security) in selinux_xfrm_state_pol_flow_match() 181 if (x->security) in selinux_xfrm_state_pol_flow_match() 188 if (!x->security) in selinux_xfrm_state_pol_flow_match() 196 state_sid = x->security in selinux_xfrm_state_pol_flow_match() [all...] |
/kernel/linux/common_modules/xpm/ |
H A D | Makefile | 23 -I$(srctree)/security/xpm/core \ 24 -I$(srctree)/security/xpm/validator \ 25 -I$(srctree)/security/xpm/developer \ 26 -I$(srctree)/security/selinux/include \ 27 -I$(srctree)/security/selinux \ 38 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
|
H A D | apply_xpm.sh | 18 if [ ! -d " $KERNEL_BUILD_ROOT/security/xpm" ]; then 19 mkdir $KERNEL_BUILD_ROOT/security/xpm 22 cd $KERNEL_BUILD_ROOT/security/xpm 23 ln -s -f $(realpath --relative-to=$KERNEL_BUILD_ROOT/security/xpm/ $XPM_SOURCE_ROOT)/* ./
|
/kernel/linux/common_modules/memory_security/ |
H A D | Makefile | 21 -I$(srctree)/security/selinux/include \ 22 -I$(srctree)/security/selinux 27 -I$(srctree)/security/selinux/include \ 28 -I$(srctree)/security/selinux 36 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
|
/kernel/linux/common_modules/code_sign/ |
H A D | Makefile | 13 -I$(srctree)/security/selinux/include \ 14 -I$(srctree)/security/selinux \ 15 -I$(srctree)/security/xpm/developer 23 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
|
/kernel/linux/common_modules/container_escape_detection/ |
H A D | apply_ced.sh | 18 if [ ! -d " $KERNEL_BUILD_ROOT/security/container_escape_detection" ]; then 19 mkdir $KERNEL_BUILD_ROOT/security/container_escape_detection 22 cd $KERNEL_BUILD_ROOT/security/container_escape_detection 23 ln -s -f $(realpath --relative-to=$KERNEL_BUILD_ROOT/security/container_escape_detection/ $CED_SOURCE_ROOT)/* ./
|
H A D | Makefile | 9 -I$(srctree)/security/container_escape_detection/include \ 10 -I$(srctree)/security/selinux/include 18 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
|
/kernel/linux/linux-5.10/drivers/gpu/drm/i915/gt/ |
H A D | gen6_engine_cs.c | 232 u32 security; in gen6_emit_bb_start() local 235 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start() 237 security = 0; in gen6_emit_bb_start() 243 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start() 254 u32 security; in hsw_emit_bb_start() local 257 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start() 259 security = 0; in hsw_emit_bb_start() 265 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
|
/kernel/linux/linux-6.6/drivers/gpu/drm/i915/gt/ |
H A D | gen6_engine_cs.c | 233 u32 security; in gen6_emit_bb_start() local 236 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start() 238 security = 0; in gen6_emit_bb_start() 244 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start() 255 u32 security; in hsw_emit_bb_start() local 258 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start() 260 security = 0; in hsw_emit_bb_start() 266 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
|
/kernel/linux/linux-5.10/security/ |
H A D | security.c | 41 * all security modules to use the same descriptions for auditing 254 /* Process "security=", if given. */ in ordered_lsm_parse() 259 * To match the original "security=" behavior, this in ordered_lsm_parse() 269 init_debug("security=%s disabled: %s\n", in ordered_lsm_parse() 293 /* Process "security=", if given. */ in ordered_lsm_parse() 299 append_ordered_lsm(lsm, "security="); in ordered_lsm_parse() 328 pr_info("security= is ignored because it is superseded by lsm=\n"); in ordered_lsm_init() 386 * security_init - initializes the security framework 417 __setup("security=", choose_major_lsm); 475 * @lsm: the name of the security modul 2314 security_tun_dev_alloc_security(void **security) security_tun_dev_alloc_security() argument 2320 security_tun_dev_free_security(void *security) security_tun_dev_free_security() argument 2332 security_tun_dev_attach_queue(void *security) security_tun_dev_attach_queue() argument 2338 security_tun_dev_attach(struct sock *sk, void *security) security_tun_dev_attach() argument 2344 security_tun_dev_open(void *security) security_tun_dev_open() argument [all...] |
/kernel/linux/linux-6.6/drivers/cxl/ |
H A D | pci.c | 132 if (mds->security.sanitize_node) in cxl_pci_mbox_irq() 133 mod_delayed_work(system_wq, &mds->security.poll_dwork, 0); in cxl_pci_mbox_irq() 149 container_of(work, typeof(*mds), security.poll_dwork.work); in cxl_mbox_sanitize_work() 154 mds->security.poll_tmo_secs = 0; in cxl_mbox_sanitize_work() 155 if (mds->security.sanitize_node) in cxl_mbox_sanitize_work() 156 sysfs_notify_dirent(mds->security.sanitize_node); in cxl_mbox_sanitize_work() 157 mds->security.sanitize_active = false; in cxl_mbox_sanitize_work() 161 int timeout = mds->security.poll_tmo_secs + 10; in cxl_mbox_sanitize_work() 163 mds->security.poll_tmo_secs = min(15 * 60, timeout); in cxl_mbox_sanitize_work() 164 schedule_delayed_work(&mds->security in cxl_mbox_sanitize_work() [all...] |
/kernel/linux/linux-5.10/drivers/infiniband/core/ |
H A D | security.c | 33 #include <linux/security.h> 87 ret = security_ib_pkey_access(qp_sec->security, subnet_prefix, pkey); in enforce_qp_pkey_security() 94 ret = security_ib_pkey_access(shared_qp_sec->security, in enforce_qp_pkey_security() 103 /* The caller of this function must hold the QP security 104 * mutex of the QP of the security structure in *pps. 106 * It takes separate ports_pkeys and security structure 108 * or the pps will be for the real QP and security structure 150 /* The caller of this function must hold the QP security 164 * the qp pointer in the security structure is in qp_to_error() 240 /* The caller of this function must hold the QP security [all...] |
/kernel/linux/linux-6.6/drivers/infiniband/core/ |
H A D | security.c | 33 #include <linux/security.h> 87 ret = security_ib_pkey_access(qp_sec->security, subnet_prefix, pkey); in enforce_qp_pkey_security() 94 ret = security_ib_pkey_access(shared_qp_sec->security, in enforce_qp_pkey_security() 103 /* The caller of this function must hold the QP security 104 * mutex of the QP of the security structure in *pps. 106 * It takes separate ports_pkeys and security structure 108 * or the pps will be for the real QP and security structure 150 /* The caller of this function must hold the QP security 164 * the qp pointer in the security structure is in qp_to_error() 240 /* The caller of this function must hold the QP security [all...] |
/kernel/liteos_a/security/ |
H A D | Makefile | 38 LOCAL_INCLUDE += -I $(LITEOSTOPDIR)/security/cap 43 LOCAL_INCLUDE += -I $(LITEOSTOPDIR)/security/vid
|
/kernel/linux/linux-6.6/security/ |
H A D | security.c | 40 * all security modules to use the same descriptions for auditing 260 /* Process "security=", if given. */ in ordered_lsm_parse() 265 * To match the original "security=" behavior, this in ordered_lsm_parse() 275 init_debug("security=%s disabled: %s (only one legacy major LSM)\n", in ordered_lsm_parse() 300 /* Process "security=", if given. */ in ordered_lsm_parse() 306 append_ordered_lsm(lsm, "security="); in ordered_lsm_parse() 361 pr_warn("security=%s is ignored because it is superseded by lsm=%s\n", in ordered_lsm_init() 423 * security_init - initializes the security framework 431 init_debug("legacy security=%s\n", chosen_major_lsm ? : " *unspecified*"); in security_init() 458 __setup("security in choose_major_lsm() 4621 security_tun_dev_alloc_security(void **security) security_tun_dev_alloc_security() argument 4633 security_tun_dev_free_security(void *security) security_tun_dev_free_security() argument 4660 security_tun_dev_attach_queue(void *security) security_tun_dev_attach_queue() argument 4676 security_tun_dev_attach(struct sock *sk, void *security) security_tun_dev_attach() argument 4691 security_tun_dev_open(void *security) security_tun_dev_open() argument [all...] |
/kernel/linux/common_modules/tzdriver/auth/ |
H A D | Makefile | 8 EXTRA_CFLAGS += -I$(KERNEL_DIR)/../../../../base/security/selinux/include 9 EXTRA_CFLAGS += -I$(KERNEL_DIR)/../../../../base/security/selinux
|
/kernel/linux/linux-5.10/net/rxrpc/ |
H A D | security.c | 2 /* RxRPC security handling 56 * look up an rxrpc security module 66 * initialise the security on a client connection 91 conn->security = sec; in rxrpc_init_client_conn_security() 93 ret = conn->security->init_connection_security(conn); in rxrpc_init_client_conn_security() 95 conn->security = &rxrpc_no_security; in rxrpc_init_client_conn_security() 104 * Find the security key for a server connection.
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | objsec.h | 3 * NSA Security-Enhanced Linux (SELinux) security module 5 * This file contains the SELinux security data structures for kernel objects. 51 u16 sclass; /* security class of this object */ 80 u16 sclass; /* security class of this object */ 118 u16 sclass; /* sock security class */ 154 return cred->security + selinux_blob_sizes.lbs_cred; in selinux_cred() 173 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg; in selinux_msg_msg() 179 return ipc->security + selinux_blob_sizes.lbs_ipc; in selinux_ipc() 183 * get the subjective security ID of the current task
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | objsec.h | 3 * Security-Enhanced Linux (SELinux) security module 5 * This file contains the SELinux security data structures for kernel objects. 51 u16 sclass; /* security class of this object */ 79 u16 sclass; /* security class of this object */ 117 u16 sclass; /* sock security class */ 153 return cred->security + selinux_blob_sizes.lbs_cred; in selinux_cred() 172 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg; in selinux_msg_msg() 178 return ipc->security + selinux_blob_sizes.lbs_ipc; in selinux_ipc() 182 * get the subjective security ID of the current task
|
/kernel/linux/linux-5.10/fs/reiserfs/ |
H A D | namei.c | 636 struct reiserfs_security_handle security; in reiserfs_create() local 652 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_create() 668 inode, &security); in reiserfs_create() 698 reiserfs_security_free(&security); in reiserfs_create() 708 struct reiserfs_security_handle security; in reiserfs_mknod() local 732 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mknod() 748 inode, &security); in reiserfs_mknod() 782 reiserfs_security_free(&security); in reiserfs_mknod() 791 struct reiserfs_security_handle security; in reiserfs_mkdir() local 823 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mkdir() 1108 struct reiserfs_security_handle security; reiserfs_symlink() local [all...] |