/linux-4.19.296/drivers/memory/tegra/ |
D | tegra186.c | 26 unsigned int security; member 36 .security = 0x004, 43 .security = 0x074, 50 .security = 0x0ac, 57 .security = 0x0b4, 64 .security = 0x0e4, 71 .security = 0x0fc, 78 .security = 0x13c, 85 .security = 0x15c, 92 .security = 0x18c, [all …]
|
/linux-4.19.296/fs/9p/ |
D | Kconfig | 38 implemented by security modules like SELinux. This option 39 enables an extended attribute handler for file security 42 If you are not using a security module that requires using 43 extended attributes for file security labels, say N.
|
/linux-4.19.296/fs/ext2/ |
D | Kconfig | 35 implemented by security modules like SELinux. This option 36 enables an extended attribute handler for file security 39 If you are not using a security module that requires using 40 extended attributes for file security labels, say N.
|
/linux-4.19.296/fs/jfs/ |
D | Kconfig | 26 implemented by security modules like SELinux. This option 27 enables an extended attribute handler for file security 30 If you are not using a security module that requires using 31 extended attributes for file security labels, say N.
|
/linux-4.19.296/drivers/char/tpm/ |
D | Kconfig | 12 If you have a TPM security chip in your system, which 51 If you have a TPM security chip that is compliant with the 62 If you have a TPM security chip which is connected to a regular, 73 If you have an Atmel I2C TPM security chip say Yes and it will be 82 If you have a TPM security chip that is compliant with the 93 If you have a TPM security chip with an I2C interface from 103 If you have a TPM security chip from National Semiconductor 112 If you have a TPM security chip from Atmel say Yes and it 120 If you have a TPM security chip from Infineon Technologies 152 If you have a TPM security chip that is compliant with the
|
/linux-4.19.296/drivers/char/tpm/st33zp24/ |
D | Kconfig | 16 This module adds support for the STMicroelectronics TPM security chip 26 This module adds support for the STMicroelectronics TPM security chip
|
/linux-4.19.296/fs/reiserfs/ |
D | namei.c | 636 struct reiserfs_security_handle security; in reiserfs_create() local 652 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_create() 668 inode, &security); in reiserfs_create() 698 reiserfs_security_free(&security); in reiserfs_create() 708 struct reiserfs_security_handle security; in reiserfs_mknod() local 732 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mknod() 748 inode, &security); in reiserfs_mknod() 782 reiserfs_security_free(&security); in reiserfs_mknod() 791 struct reiserfs_security_handle security; in reiserfs_mkdir() local 823 retval = reiserfs_security_init(dir, inode, &dentry->d_name, &security); in reiserfs_mkdir() [all …]
|
D | Kconfig | 79 implemented by security modules like SELinux. This option 80 enables an extended attribute handler for file security 83 If you are not using a security module that requires using 84 extended attributes for file security labels, say N.
|
/linux-4.19.296/fs/ext4/ |
D | Kconfig | 92 implemented by security modules like SELinux. This option 93 enables an extended attribute handler for file security 96 If you are not using a security module that requires using 97 extended attributes for file security labels, say N.
|
/linux-4.19.296/include/linux/ |
D | msg.h | 14 void *security; member
|
D | ipc.h | 23 void *security; member
|
D | security.h | 1238 int security_tun_dev_alloc_security(void **security); 1239 void security_tun_dev_free_security(void *security); 1241 int security_tun_dev_attach_queue(void *security); 1242 int security_tun_dev_attach(struct sock *sk, void *security); 1243 int security_tun_dev_open(void *security); 1419 static inline int security_tun_dev_alloc_security(void **security) in security_tun_dev_alloc_security() argument 1424 static inline void security_tun_dev_free_security(void *security) in security_tun_dev_free_security() argument 1433 static inline int security_tun_dev_attach_queue(void *security) in security_tun_dev_attach_queue() argument 1438 static inline int security_tun_dev_attach(struct sock *sk, void *security) in security_tun_dev_attach() argument 1443 static inline int security_tun_dev_open(void *security) in security_tun_dev_open() argument
|
D | cred.h | 148 void *security; /* subjective LSM security */ member 381 #define current_security() (current_cred_xxx(security))
|
D | lsm_hooks.h | 1708 int (*tun_dev_alloc_security)(void **security); 1709 void (*tun_dev_free_security)(void *security); 1711 int (*tun_dev_attach_queue)(void *security); 1712 int (*tun_dev_attach)(struct sock *sk, void *security); 1713 int (*tun_dev_open)(void *security);
|
/linux-4.19.296/fs/cachefiles/ |
D | Makefile | 14 security.o \
|
/linux-4.19.296/fs/cifs/ |
D | Kconfig | 40 (smbdirect), advanced security features, per-share encryption, 45 performance, security and features, than would be possible with CIFS. 73 additional security features, including protection against 83 bool "Support legacy servers which use weaker LANMAN security" 88 security mechanisms. These hash the password more securely 96 security mechanisms if you are on a public network. Unless you
|
/linux-4.19.296/fs/jffs2/ |
D | Kconfig | 92 implemented by security modules like SELinux. This option 93 enables an extended attribute handler for file security 96 If you are not using a security module that requires using 97 extended attributes for file security labels, say N.
|
D | Makefile | 16 jffs2-$(CONFIG_JFFS2_FS_SECURITY) += security.o
|
/linux-4.19.296/fs/afs/ |
D | Makefile | 26 security.o \
|
/linux-4.19.296/ |
D | Kconfig | 26 source "security/Kconfig"
|
/linux-4.19.296/fs/ubifs/ |
D | Kconfig | 84 security labels in the ubifs filesystem, so that it requires enabling 87 If you are not using a security module, say N.
|
/linux-4.19.296/drivers/of/unittest-data/ |
D | tests-phandle.dtsi | 9 security-password = "password";
|
/linux-4.19.296/fs/f2fs/ |
D | Kconfig | 60 security labels in the f2fs filesystem, so that it requires enabling 63 If you are not using a security module, say N.
|
/linux-4.19.296/fs/nfsd/ |
D | Kconfig | 139 Say Y here if you want enable fine-grained security label attribute 140 support for NFS version 4. Security labels allow security modules like 144 If you do not wish to enable fine-grained security labels SELinux or
|
/linux-4.19.296/fs/coda/ |
D | Kconfig | 10 replication, security model for authentication and encryption,
|