Home
last modified time | relevance | path

Searched refs:security (Results 1 - 25 of 747) sorted by relevance

12345678910>>...30

/kernel/linux/linux-5.10/drivers/memory/tegra/
H A Dtegra186.c25 unsigned int security; member
47 u32 override, security; in tegra186_mc_program_sid() local
50 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid()
52 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid()
53 client->name, override, security); in tegra186_mc_program_sid()
60 security = readl(mc->regs + client->regs.security); in tegra186_mc_program_sid()
62 dev_dbg(mc->dev, "client %s: override: %x security: %x\n", in tegra186_mc_program_sid()
63 client->name, override, security); in tegra186_mc_program_sid()
[all...]
/kernel/linux/linux-6.6/drivers/memory/tegra/
H A Dtegra194.c20 .security = 0x004,
30 .security = 0x00c,
40 .security = 0x014,
50 .security = 0x0ac,
60 .security = 0x0b4,
70 .security = 0x0e4,
80 .security = 0x0fc,
90 .security = 0x13c,
100 .security = 0x15c,
110 .security
[all...]
H A Dtegra186.c78 value = readl(mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override()
97 writel(value, mc->regs + client->regs.sid.security); in tegra186_mc_client_sid_override()
155 .security = 0x004,
165 .security = 0x074,
175 .security = 0x0ac,
185 .security = 0x0b4,
195 .security = 0x0e4,
205 .security = 0x0fc,
215 .security = 0x13c,
225 .security
[all...]
H A Dtegra234.c17 * override and security register offsets.
29 .security = 0xac,
41 .security = 0xe4,
53 .security = 0x144,
65 .security = 0x14c,
77 .security = 0x154,
89 .security = 0x15c,
99 .security = 0x164,
109 .security = 0x16c,
119 .security
[all...]
/kernel/linux/linux-5.10/security/selinux/
H A Dxfrm.c3 * NSA Security-Enhanced Linux (SELinux) security module
29 * 3. Testing addition of sk_policy's with security context via setsockopt
33 #include <linux/security.h>
63 * Returns true if the xfrm contains a security blob for SELinux.
67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
71 * Allocates a xfrm_sec_state and populates it using the supplied security
183 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
184 if (x->security) in selinux_xfrm_state_pol_flow_match()
191 if (!x->security) in selinux_xfrm_state_pol_flow_match()
199 state_sid = x->security in selinux_xfrm_state_pol_flow_match()
[all...]
/kernel/linux/linux-6.6/security/selinux/
H A Dxfrm.c3 * Security-Enhanced Linux (SELinux) security module
29 * 3. Testing addition of sk_policy's with security context via setsockopt
33 #include <linux/security.h>
63 * Returns true if the xfrm contains a security blob for SELinux.
67 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
71 * Allocates a xfrm_sec_state and populates it using the supplied security
180 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
181 if (x->security) in selinux_xfrm_state_pol_flow_match()
188 if (!x->security) in selinux_xfrm_state_pol_flow_match()
196 state_sid = x->security in selinux_xfrm_state_pol_flow_match()
[all...]
/kernel/linux/common_modules/xpm/
H A DMakefile23 -I$(srctree)/security/xpm/core \
24 -I$(srctree)/security/xpm/validator \
25 -I$(srctree)/security/xpm/developer \
26 -I$(srctree)/security/selinux/include \
27 -I$(srctree)/security/selinux \
38 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
H A Dapply_xpm.sh18 if [ ! -d " $KERNEL_BUILD_ROOT/security/xpm" ]; then
19 mkdir $KERNEL_BUILD_ROOT/security/xpm
22 cd $KERNEL_BUILD_ROOT/security/xpm
23 ln -s -f $(realpath --relative-to=$KERNEL_BUILD_ROOT/security/xpm/ $XPM_SOURCE_ROOT)/* ./
/kernel/linux/common_modules/memory_security/
H A DMakefile21 -I$(srctree)/security/selinux/include \
22 -I$(srctree)/security/selinux
27 -I$(srctree)/security/selinux/include \
28 -I$(srctree)/security/selinux
36 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
/kernel/linux/common_modules/code_sign/
H A DMakefile13 -I$(srctree)/security/selinux/include \
14 -I$(srctree)/security/selinux \
15 -I$(srctree)/security/xpm/developer
23 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
/kernel/linux/common_modules/container_escape_detection/
H A Dapply_ced.sh18 if [ ! -d " $KERNEL_BUILD_ROOT/security/container_escape_detection" ]; then
19 mkdir $KERNEL_BUILD_ROOT/security/container_escape_detection
22 cd $KERNEL_BUILD_ROOT/security/container_escape_detection
23 ln -s -f $(realpath --relative-to=$KERNEL_BUILD_ROOT/security/container_escape_detection/ $CED_SOURCE_ROOT)/* ./
H A DMakefile9 -I$(srctree)/security/container_escape_detection/include \
10 -I$(srctree)/security/selinux/include
18 $(obj)/flask.h: $(srctree)/security/selinux/include/classmap.h FORCE
/kernel/linux/linux-5.10/drivers/gpu/drm/i915/gt/
H A Dgen6_engine_cs.c232 u32 security; in gen6_emit_bb_start() local
235 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start()
237 security = 0; in gen6_emit_bb_start()
243 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start()
254 u32 security; in hsw_emit_bb_start() local
257 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start()
259 security = 0; in hsw_emit_bb_start()
265 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
/kernel/linux/linux-6.6/drivers/gpu/drm/i915/gt/
H A Dgen6_engine_cs.c233 u32 security; in gen6_emit_bb_start() local
236 security = MI_BATCH_NON_SECURE_I965; in gen6_emit_bb_start()
238 security = 0; in gen6_emit_bb_start()
244 cs = __gen6_emit_bb_start(cs, offset, security); in gen6_emit_bb_start()
255 u32 security; in hsw_emit_bb_start() local
258 security = MI_BATCH_PPGTT_HSW | MI_BATCH_NON_SECURE_HSW; in hsw_emit_bb_start()
260 security = 0; in hsw_emit_bb_start()
266 cs = __gen6_emit_bb_start(cs, offset, security); in hsw_emit_bb_start()
/kernel/linux/linux-5.10/security/
H A Dsecurity.c41 * all security modules to use the same descriptions for auditing
254 /* Process "security=", if given. */ in ordered_lsm_parse()
259 * To match the original "security=" behavior, this in ordered_lsm_parse()
269 init_debug("security=%s disabled: %s\n", in ordered_lsm_parse()
293 /* Process "security=", if given. */ in ordered_lsm_parse()
299 append_ordered_lsm(lsm, "security="); in ordered_lsm_parse()
328 pr_info("security= is ignored because it is superseded by lsm=\n"); in ordered_lsm_init()
386 * security_init - initializes the security framework
417 __setup("security=", choose_major_lsm);
475 * @lsm: the name of the security modul
2314 security_tun_dev_alloc_security(void **security) security_tun_dev_alloc_security() argument
2320 security_tun_dev_free_security(void *security) security_tun_dev_free_security() argument
2332 security_tun_dev_attach_queue(void *security) security_tun_dev_attach_queue() argument
2338 security_tun_dev_attach(struct sock *sk, void *security) security_tun_dev_attach() argument
2344 security_tun_dev_open(void *security) security_tun_dev_open() argument
[all...]
/kernel/linux/linux-6.6/drivers/cxl/
H A Dpci.c132 if (mds->security.sanitize_node) in cxl_pci_mbox_irq()
133 mod_delayed_work(system_wq, &mds->security.poll_dwork, 0); in cxl_pci_mbox_irq()
149 container_of(work, typeof(*mds), security.poll_dwork.work); in cxl_mbox_sanitize_work()
154 mds->security.poll_tmo_secs = 0; in cxl_mbox_sanitize_work()
155 if (mds->security.sanitize_node) in cxl_mbox_sanitize_work()
156 sysfs_notify_dirent(mds->security.sanitize_node); in cxl_mbox_sanitize_work()
157 mds->security.sanitize_active = false; in cxl_mbox_sanitize_work()
161 int timeout = mds->security.poll_tmo_secs + 10; in cxl_mbox_sanitize_work()
163 mds->security.poll_tmo_secs = min(15 * 60, timeout); in cxl_mbox_sanitize_work()
164 schedule_delayed_work(&mds->security in cxl_mbox_sanitize_work()
[all...]
/kernel/linux/linux-5.10/drivers/infiniband/core/
H A Dsecurity.c33 #include <linux/security.h>
87 ret = security_ib_pkey_access(qp_sec->security, subnet_prefix, pkey); in enforce_qp_pkey_security()
94 ret = security_ib_pkey_access(shared_qp_sec->security, in enforce_qp_pkey_security()
103 /* The caller of this function must hold the QP security
104 * mutex of the QP of the security structure in *pps.
106 * It takes separate ports_pkeys and security structure
108 * or the pps will be for the real QP and security structure
150 /* The caller of this function must hold the QP security
164 * the qp pointer in the security structure is in qp_to_error()
240 /* The caller of this function must hold the QP security
[all...]
/kernel/linux/linux-6.6/drivers/infiniband/core/
H A Dsecurity.c33 #include <linux/security.h>
87 ret = security_ib_pkey_access(qp_sec->security, subnet_prefix, pkey); in enforce_qp_pkey_security()
94 ret = security_ib_pkey_access(shared_qp_sec->security, in enforce_qp_pkey_security()
103 /* The caller of this function must hold the QP security
104 * mutex of the QP of the security structure in *pps.
106 * It takes separate ports_pkeys and security structure
108 * or the pps will be for the real QP and security structure
150 /* The caller of this function must hold the QP security
164 * the qp pointer in the security structure is in qp_to_error()
240 /* The caller of this function must hold the QP security
[all...]
/kernel/liteos_a/security/
H A DMakefile38 LOCAL_INCLUDE += -I $(LITEOSTOPDIR)/security/cap
43 LOCAL_INCLUDE += -I $(LITEOSTOPDIR)/security/vid
/kernel/linux/linux-6.6/security/
H A Dsecurity.c40 * all security modules to use the same descriptions for auditing
260 /* Process "security=", if given. */ in ordered_lsm_parse()
265 * To match the original "security=" behavior, this in ordered_lsm_parse()
275 init_debug("security=%s disabled: %s (only one legacy major LSM)\n", in ordered_lsm_parse()
300 /* Process "security=", if given. */ in ordered_lsm_parse()
306 append_ordered_lsm(lsm, "security="); in ordered_lsm_parse()
361 pr_warn("security=%s is ignored because it is superseded by lsm=%s\n", in ordered_lsm_init()
423 * security_init - initializes the security framework
431 init_debug("legacy security=%s\n", chosen_major_lsm ? : " *unspecified*"); in security_init()
458 __setup("security in choose_major_lsm()
4621 security_tun_dev_alloc_security(void **security) security_tun_dev_alloc_security() argument
4633 security_tun_dev_free_security(void *security) security_tun_dev_free_security() argument
4660 security_tun_dev_attach_queue(void *security) security_tun_dev_attach_queue() argument
4676 security_tun_dev_attach(struct sock *sk, void *security) security_tun_dev_attach() argument
4691 security_tun_dev_open(void *security) security_tun_dev_open() argument
[all...]
/kernel/linux/common_modules/tzdriver/auth/
H A DMakefile8 EXTRA_CFLAGS += -I$(KERNEL_DIR)/../../../../base/security/selinux/include
9 EXTRA_CFLAGS += -I$(KERNEL_DIR)/../../../../base/security/selinux
/kernel/linux/linux-5.10/net/rxrpc/
H A Dsecurity.c2 /* RxRPC security handling
56 * look up an rxrpc security module
66 * initialise the security on a client connection
91 conn->security = sec; in rxrpc_init_client_conn_security()
93 ret = conn->security->init_connection_security(conn); in rxrpc_init_client_conn_security()
95 conn->security = &rxrpc_no_security; in rxrpc_init_client_conn_security()
104 * Find the security key for a server connection.
/kernel/linux/linux-5.10/security/selinux/include/
H A Dobjsec.h3 * NSA Security-Enhanced Linux (SELinux) security module
5 * This file contains the SELinux security data structures for kernel objects.
51 u16 sclass; /* security class of this object */
80 u16 sclass; /* security class of this object */
118 u16 sclass; /* sock security class */
154 return cred->security + selinux_blob_sizes.lbs_cred; in selinux_cred()
173 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg; in selinux_msg_msg()
179 return ipc->security + selinux_blob_sizes.lbs_ipc; in selinux_ipc()
183 * get the subjective security ID of the current task
/kernel/linux/linux-6.6/security/selinux/include/
H A Dobjsec.h3 * Security-Enhanced Linux (SELinux) security module
5 * This file contains the SELinux security data structures for kernel objects.
51 u16 sclass; /* security class of this object */
79 u16 sclass; /* security class of this object */
117 u16 sclass; /* sock security class */
153 return cred->security + selinux_blob_sizes.lbs_cred; in selinux_cred()
172 return msg_msg->security + selinux_blob_sizes.lbs_msg_msg; in selinux_msg_msg()
178 return ipc->security + selinux_blob_sizes.lbs_ipc; in selinux_ipc()
182 * get the subjective security ID of the current task
/kernel/linux/linux-5.10/fs/reiserfs/
H A Dnamei.c636 struct reiserfs_security_handle security; in reiserfs_create() local
652 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_create()
668 inode, &security); in reiserfs_create()
698 reiserfs_security_free(&security); in reiserfs_create()
708 struct reiserfs_security_handle security; in reiserfs_mknod() local
732 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mknod()
748 inode, &security); in reiserfs_mknod()
782 reiserfs_security_free(&security); in reiserfs_mknod()
791 struct reiserfs_security_handle security; in reiserfs_mkdir() local
823 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mkdir()
1108 struct reiserfs_security_handle security; reiserfs_symlink() local
[all...]

Completed in 24 milliseconds

12345678910>>...30