Symbol: RC
enum value global
Defined...
-
drivers/dma/hisi_dma.c:97:2-97:2: RC,
-
drivers/infiniband/hw/mthca/mthca_qp.c:285:8-285:8: enum { RC, UC, UD, RD, RDEE, MLX, NUM_TRANS };
-
sound/hda/hdmi_chmap.c:32:2-32:16: RC = (1 << 6), /* Rear Center */
-
sound/soc/codecs/hdmi-codec.c:41:2-41:8: RC = BIT(6), /* Rear Center */
-
sound/x86/intel_hdmi_audio.h:60:2-60:16: RC = (1 << 6), /* Rear Center */
macro public
Defined...
variable
Defined...
-
security/security.c:4372:9-4372:9: return call_int_hook(socket_getpeersec_stream, -ENOPROTOOPT, sock,
-
security/security.c:4393:9-4393:9: return call_int_hook(socket_getpeersec_dgram, -ENOPROTOOPT, sock,
-
security/security.c:4015:9-4015:9: return call_int_hook(inode_getsecctx, -EOPNOTSUPP, inode, ctx, ctxlen);
-
security/security.c:800:9-800:9: return call_int_hook(binder_set_context_mgr, 0, mgr);
-
security/security.c:815:9-815:9: return call_int_hook(binder_transaction, 0, from, to);
-
security/security.c:830:9-830:9: return call_int_hook(binder_transfer_binder, 0, from, to);
-
security/security.c:846:9-846:9: return call_int_hook(binder_transfer_file, 0, from, to, file);
-
security/security.c:865:9-865:9: return call_int_hook(ptrace_access_check, 0, child, mode);
-
security/security.c:880:9-880:9: return call_int_hook(ptrace_traceme, 0, parent);
-
security/security.c:902:9-902:9: return call_int_hook(capget, 0, target,
-
security/security.c:924:9-924:9: return call_int_hook(capset, 0, new, old,
-
security/security.c:946:9-946:9: return call_int_hook(capable, 0, cred, ns, cap, opts);
-
security/security.c:962:9-962:9: return call_int_hook(quotactl, 0, cmds, type, id, sb);
-
security/security.c:975:9-975:9: return call_int_hook(quota_on, 0, dentry);
-
security/security.c:990:9-990:9: return call_int_hook(syslog, 0, type);
-
security/security.c:1005:9-1005:9: return call_int_hook(settime, 0, ts, tz);
-
security/security.c:1060:9-1060:9: return call_int_hook(bprm_creds_for_exec, 0, bprm);
-
security/security.c:1084:9-1084:9: return call_int_hook(bprm_creds_from_file, 0, bprm, file);
-
security/security.c:1103:8-1103:8: ret = call_int_hook(bprm_check_security, 0, bprm);
-
security/security.c:1153:9-1153:9: return call_int_hook(fs_context_submount, 0, fc, reference);
-
security/security.c:1169:9-1169:9: return call_int_hook(fs_context_dup, 0, fc, src_fc);
-
security/security.c:1218:7-1218:7: rc = call_int_hook(sb_alloc_security, 0, sb);
-
security/security.c:1276:9-1276:9: return call_int_hook(sb_eat_lsm_opts, 0, options, mnt_opts);
-
security/security.c:1293:9-1293:9: return call_int_hook(sb_mnt_opts_compat, 0, sb, mnt_opts);
-
security/security.c:1310:9-1310:9: return call_int_hook(sb_remount, 0, sb, mnt_opts);
-
security/security.c:1324:9-1324:9: return call_int_hook(sb_kern_mount, 0, sb);
-
security/security.c:1338:9-1338:9: return call_int_hook(sb_show_options, 0, m, sb);
-
security/security.c:1352:9-1352:9: return call_int_hook(sb_statfs, 0, dentry);
-
security/security.c:1375:9-1375:9: return call_int_hook(sb_mount, 0, dev_name, path, type, flags, data);
-
security/security.c:1389:9-1389:9: return call_int_hook(sb_umount, 0, mnt, flags);
-
security/security.c:1404:9-1404:9: return call_int_hook(sb_pivotroot, 0, old_path, new_path);
-
security/security.c:1423:9-1423:9: return call_int_hook(sb_set_mnt_opts,
-
security/security.c:1445:9-1445:9: return call_int_hook(sb_clone_mnt_opts, 0, oldsb, newsb,
-
security/security.c:1462:9-1462:9: return call_int_hook(move_mount, 0, from_path, to_path);
-
security/security.c:1479:9-1479:9: return call_int_hook(path_notify, 0, path, mask, obj_type);
-
security/security.c:1498:7-1498:7: rc = call_int_hook(inode_alloc_security, 0, inode);
-
security/security.c:1592:9-1592:9: return call_int_hook(dentry_create_files_as, 0, dentry, mode,
-
security/security.c:1693:9-1693:9: return call_int_hook(inode_init_security_anon, 0, inode, name,
-
security/security.c:1715:9-1715:9: return call_int_hook(path_mknod, 0, dir, dentry, mode, dev);
-
security/security.c:1734:9-1734:9: return call_int_hook(path_mkdir, 0, dir, dentry, mode);
-
security/security.c:1751:9-1751:9: return call_int_hook(path_rmdir, 0, dir, dentry);
-
security/security.c:1767:9-1767:9: return call_int_hook(path_unlink, 0, dir, dentry);
-
security/security.c:1786:9-1786:9: return call_int_hook(path_symlink, 0, dir, dentry, old_name);
-
security/security.c:1804:9-1804:9: return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
-
security/security.c:1828:9-1828:9: return call_int_hook(path_rename, 0, old_dir, old_dentry, new_dir,
-
security/security.c:1847:9-1847:9: return call_int_hook(path_truncate, 0, path);
-
security/security.c:1865:9-1865:9: return call_int_hook(path_chmod, 0, path, mode);
-
security/security.c:1882:9-1882:9: return call_int_hook(path_chown, 0, path, uid, gid);
-
security/security.c:1895:9-1895:9: return call_int_hook(path_chroot, 0, path);
-
security/security.c:1914:9-1914:9: return call_int_hook(inode_create, 0, dir, dentry, mode);
-
security/security.c:1933:9-1933:9: return call_int_hook(inode_link, 0, old_dentry, dir, new_dentry);
-
security/security.c:1949:9-1949:9: return call_int_hook(inode_unlink, 0, dir, dentry);
-
security/security.c:1967:9-1967:9: return call_int_hook(inode_symlink, 0, dir, dentry, old_name);
-
security/security.c:1985:9-1985:9: return call_int_hook(inode_mkdir, 0, dir, dentry, mode);
-
security/security.c:2002:9-2002:9: return call_int_hook(inode_rmdir, 0, dir, dentry);
-
security/security.c:2024:9-2024:9: return call_int_hook(inode_mknod, 0, dir, dentry, mode, dev);
-
security/security.c:2049:13-2049:13: int err = call_int_hook(inode_rename, 0, new_dir, new_dentry,
-
security/security.c:2055:9-2055:9: return call_int_hook(inode_rename, 0, old_dir, old_dentry,
-
security/security.c:2071:9-2071:9: return call_int_hook(inode_readlink, 0, dentry);
-
security/security.c:2090:9-2090:9: return call_int_hook(inode_follow_link, 0, dentry, inode, rcu);
-
security/security.c:2111:9-2111:9: return call_int_hook(inode_permission, 0, inode, mask);
-
security/security.c:2134:8-2134:8: ret = call_int_hook(inode_setattr, 0, dentry, attr);
-
security/security.c:2153:9-2153:9: return call_int_hook(inode_getattr, 0, path);
-
security/security.c:2181:8-2181:8: ret = call_int_hook(inode_setxattr, 1, idmap, dentry, name, value,
-
security/security.c:2214:8-2214:8: ret = call_int_hook(inode_set_acl, 0, idmap, dentry, acl_name,
-
security/security.c:2240:9-2240:9: return call_int_hook(inode_get_acl, 0, idmap, dentry, acl_name);
-
security/security.c:2261:8-2261:8: ret = call_int_hook(inode_remove_acl, 0, idmap, dentry, acl_name);
-
security/security.c:2303:9-2303:9: return call_int_hook(inode_getxattr, 0, dentry, name);
-
security/security.c:2319:9-2319:9: return call_int_hook(inode_listxattr, 0, dentry);
-
security/security.c:2344:8-2344:8: ret = call_int_hook(inode_removexattr, 1, idmap, dentry, name);
-
security/security.c:2368:9-2368:9: return call_int_hook(inode_need_killpriv, 0, dentry);
-
security/security.c:2385:9-2385:9: return call_int_hook(inode_killpriv, 0, idmap, dentry);
-
security/security.c:2478:9-2478:9: return call_int_hook(inode_listsecurity, 0, inode, buffer, buffer_size);
-
security/security.c:2509:9-2509:9: return call_int_hook(inode_copy_up, 0, src, new);
-
security/security.c:2559:9-2559:9: return call_int_hook(kernfs_init_security, 0, kn_dir, kn);
-
security/security.c:2585:8-2585:8: ret = call_int_hook(file_permission, 0, file, mask);
-
security/security.c:2607:7-2607:7: rc = call_int_hook(file_alloc_security, 0, file);
-
security/security.c:2647:9-2647:9: return call_int_hook(file_ioctl, 0, file, cmd, arg);
-
security/security.c:2701:8-2701:8: ret = call_int_hook(mmap_file, 0, file, prot, prot_adj, flags);
-
security/security.c:2717:9-2717:9: return call_int_hook(mmap_addr, 0, addr);
-
security/security.c:2735:8-2735:8: ret = call_int_hook(file_mprotect, 0, vma, reqprot, prot);
-
security/security.c:2753:9-2753:9: return call_int_hook(file_lock, 0, file, cmd);
-
security/security.c:2772:9-2772:9: return call_int_hook(file_fcntl, 0, file, cmd, arg);
-
security/security.c:2806:9-2806:9: return call_int_hook(file_send_sigiotask, 0, tsk, fown, sig);
-
security/security.c:2820:9-2820:9: return call_int_hook(file_receive, 0, file);
-
security/security.c:2836:8-2836:8: ret = call_int_hook(file_open, 0, file);
-
security/security.c:2855:9-2855:9: return call_int_hook(file_truncate, 0, file);
-
security/security.c:2873:7-2873:7: rc = call_int_hook(task_alloc, 0, task, clone_flags);
-
security/security.c:2911:7-2911:7: rc = call_int_hook(cred_alloc_blank, 0, cred, gfp);
-
security/security.c:2955:7-2955:7: rc = call_int_hook(cred_prepare, 0, new, old, gfp);
-
security/security.c:3000:9-3000:9: return call_int_hook(kernel_act_as, 0, new, secid);
-
security/security.c:3016:9-3016:9: return call_int_hook(kernel_create_files_as, 0, new, inode);
-
security/security.c:3032:8-3032:8: ret = call_int_hook(kernel_module_request, 0, kmod_name);
-
security/security.c:3053:8-3053:8: ret = call_int_hook(kernel_read_file, 0, file, id, contents);
-
security/security.c:3078:8-3078:8: ret = call_int_hook(kernel_post_read_file, 0, file, buf, size, id);
-
security/security.c:3098:8-3098:8: ret = call_int_hook(kernel_load_data, 0, id, contents);
-
security/security.c:3125:8-3125:8: ret = call_int_hook(kernel_post_load_data, 0, buf, size, id,
-
security/security.c:3150:9-3150:9: return call_int_hook(task_fix_setuid, 0, new, old, flags);
-
security/security.c:3170:9-3170:9: return call_int_hook(task_fix_setgid, 0, new, old, flags);
-
security/security.c:3187:9-3187:9: return call_int_hook(task_fix_setgroups, 0, new, old);
-
security/security.c:3202:9-3202:9: return call_int_hook(task_setpgid, 0, p, pgid);
-
security/security.c:3216:9-3216:9: return call_int_hook(task_getpgid, 0, p);
-
security/security.c:3229:9-3229:9: return call_int_hook(task_getsid, 0, p);
-
security/security.c:3272:9-3272:9: return call_int_hook(task_setnice, 0, p, nice);
-
security/security.c:3286:9-3286:9: return call_int_hook(task_setioprio, 0, p, ioprio);
-
security/security.c:3299:9-3299:9: return call_int_hook(task_getioprio, 0, p);
-
security/security.c:3316:9-3316:9: return call_int_hook(task_prlimit, 0, cred, tcred, flags);
-
security/security.c:3334:9-3334:9: return call_int_hook(task_setrlimit, 0, p, resource, new_rlim);
-
security/security.c:3348:9-3348:9: return call_int_hook(task_setscheduler, 0, p);
-
security/security.c:3361:9-3361:9: return call_int_hook(task_getscheduler, 0, p);
-
security/security.c:3374:9-3374:9: return call_int_hook(task_movememory, 0, p);
-
security/security.c:3395:9-3395:9: return call_int_hook(task_kill, 0, p, info, sig, cred);
-
security/security.c:3453:9-3453:9: return call_int_hook(userns_create, 0, cred);
-
security/security.c:3467:9-3467:9: return call_int_hook(ipc_permission, 0, ipcp, flag);
-
security/security.c:3499:7-3499:7: rc = call_int_hook(msg_msg_alloc_security, 0, msg);
-
security/security.c:3533:7-3533:7: rc = call_int_hook(msg_queue_alloc_security, 0, msq);
-
security/security.c:3565:9-3565:9: return call_int_hook(msg_queue_associate, 0, msq, msqflg);
-
security/security.c:3580:9-3580:9: return call_int_hook(msg_queue_msgctl, 0, msq, cmd);
-
security/security.c:3597:9-3597:9: return call_int_hook(msg_queue_msgsnd, 0, msq, msg, msqflg);
-
security/security.c:3618:9-3618:9: return call_int_hook(msg_queue_msgrcv, 0, msq, msg, target, type, mode);
-
security/security.c:3636:7-3636:7: rc = call_int_hook(shm_alloc_security, 0, shp);
-
security/security.c:3669:9-3669:9: return call_int_hook(shm_associate, 0, shp, shmflg);
-
security/security.c:3684:9-3684:9: return call_int_hook(shm_shmctl, 0, shp, cmd);
-
security/security.c:3702:9-3702:9: return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg);
-
security/security.c:3720:7-3720:7: rc = call_int_hook(sem_alloc_security, 0, sma);
-
security/security.c:3752:9-3752:9: return call_int_hook(sem_associate, 0, sma, semflg);
-
security/security.c:3767:9-3767:9: return call_int_hook(sem_semctl, 0, sma, cmd);
-
security/security.c:3785:9-3785:9: return call_int_hook(sem_semop, 0, sma, sops, nsops, alter);
-
security/security.c:3867:9-3867:9: return call_int_hook(netlink_send, 0, sk, skb);
-
security/security.c:3880:9-3880:9: return call_int_hook(ismaclabel, 0, name);
-
security/security.c:3929:9-3929:9: return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid);
-
security/security.c:3976:9-3976:9: return call_int_hook(inode_notifysecctx, 0, inode, ctx, ctxlen);
-
security/security.c:3998:9-3998:9: return call_int_hook(inode_setsecctx, 0, dentry, ctx, ctxlen);
-
security/security.c:4034:9-4034:9: return call_int_hook(post_notification, 0, w_cred, cred, n);
-
security/security.c:4050:9-4050:9: return call_int_hook(watch_key, 0, key);
-
security/security.c:4079:9-4079:9: return call_int_hook(unix_stream_connect, 0, sock, other, newsk);
-
security/security.c:4105:9-4105:9: return call_int_hook(unix_may_send, 0, sock, other);
-
security/security.c:4122:9-4122:9: return call_int_hook(socket_create, 0, family, type, protocol, kern);
-
security/security.c:4146:9-4146:9: return call_int_hook(socket_post_create, 0, sock, family, type,
-
security/security.c:4162:9-4162:9: return call_int_hook(socket_socketpair, 0, socka, sockb);
-
security/security.c:4181:9-4181:9: return call_int_hook(socket_bind, 0, sock, address, addrlen);
-
security/security.c:4198:9-4198:9: return call_int_hook(socket_connect, 0, sock, address, addrlen);
-
security/security.c:4212:9-4212:9: return call_int_hook(socket_listen, 0, sock, backlog);
-
security/security.c:4228:9-4228:9: return call_int_hook(socket_accept, 0, sock, newsock);
-
security/security.c:4243:9-4243:9: return call_int_hook(socket_sendmsg, 0, sock, msg, size);
-
security/security.c:4260:9-4260:9: return call_int_hook(socket_recvmsg, 0, sock, msg, size, flags);
-
security/security.c:4274:9-4274:9: return call_int_hook(socket_getsockname, 0, sock);
-
security/security.c:4287:9-4287:9: return call_int_hook(socket_getpeername, 0, sock);
-
security/security.c:4303:9-4303:9: return call_int_hook(socket_getsockopt, 0, sock, level, optname);
-
security/security.c:4318:9-4318:9: return call_int_hook(socket_setsockopt, 0, sock, level, optname);
-
security/security.c:4333:9-4333:9: return call_int_hook(socket_shutdown, 0, sock, how);
-
security/security.c:4350:9-4350:9: return call_int_hook(socket_sock_rcv_skb, 0, sk, skb);
-
security/security.c:4411:9-4411:9: return call_int_hook(sk_alloc_security, 0, sk, family, priority);
-
security/security.c:4492:9-4492:9: return call_int_hook(inet_conn_request, 0, sk, skb, req);
-
security/security.c:4533:9-4533:9: return call_int_hook(secmark_relabel_packet, 0, secid);
-
security/security.c:4570:9-4570:9: return call_int_hook(tun_dev_alloc_security, 0, security);
-
security/security.c:4595:9-4595:9: return call_int_hook(tun_dev_create, 0);
-
security/security.c:4609:9-4609:9: return call_int_hook(tun_dev_attach_queue, 0, security);
-
security/security.c:4625:9-4625:9: return call_int_hook(tun_dev_attach, 0, sk, security);
-
security/security.c:4640:9-4640:9: return call_int_hook(tun_dev_open, 0, security);
-
security/security.c:4656:9-4656:9: return call_int_hook(sctp_assoc_request, 0, asoc, skb);
-
security/security.c:4677:9-4677:9: return call_int_hook(sctp_bind_connect, 0, sk, optname,
-
security/security.c:4712:9-4712:9: return call_int_hook(sctp_assoc_established, 0, asoc, skb);
-
security/security.c:4730:9-4730:9: return call_int_hook(mptcp_add_subflow, 0, sk, ssk);
-
security/security.c:4748:9-4748:9: return call_int_hook(ib_pkey_access, 0, sec, subnet_prefix, pkey);
-
security/security.c:4765:9-4765:9: return call_int_hook(ib_endport_manage_subnet, 0, sec,
-
security/security.c:4780:9-4780:9: return call_int_hook(ib_alloc_security, 0, sec);
-
security/security.c:4813:9-4813:9: return call_int_hook(xfrm_policy_alloc_security, 0, ctxp, sec_ctx, gfp);
-
security/security.c:4830:9-4830:9: return call_int_hook(xfrm_policy_clone_security, 0, old_ctx, new_ctxp);
-
security/security.c:4855:9-4855:9: return call_int_hook(xfrm_policy_delete_security, 0, ctx);
-
security/security.c:4872:9-4872:9: return call_int_hook(xfrm_state_alloc, 0, x, sec_ctx);
-
security/security.c:4891:9-4891:9: return call_int_hook(xfrm_state_alloc_acquire, 0, x, polsec, secid);
-
security/security.c:4904:9-4904:9: return call_int_hook(xfrm_state_delete_security, 0, x);
-
security/security.c:4933:9-4933:9: return call_int_hook(xfrm_policy_lookup, 0, ctx, fl_secid);
-
security/security.c:4981:9-4981:9: return call_int_hook(xfrm_decode_session, 0, skb, secid, 1);
-
security/security.c:4986:11-4986:11: int rc = call_int_hook(xfrm_decode_session, 0, skb, &flic->flowic_secid,
-
security/security.c:5009:9-5009:9: return call_int_hook(key_alloc, 0, key, cred, flags);
-
security/security.c:5036:9-5036:9: return call_int_hook(key_permission, 0, key_ref, cred, need_perm);
-
security/security.c:5055:9-5055:9: return call_int_hook(key_getsecurity, 0, key, buffer);
-
security/security.c:5074:9-5074:9: return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule);
-
security/security.c:5088:9-5088:9: return call_int_hook(audit_rule_known, 0, krule);
-
security/security.c:5118:9-5118:9: return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule);
-
security/security.c:5137:9-5137:9: return call_int_hook(bpf, 0, cmd, attr, size);
-
security/security.c:5152:9-5152:9: return call_int_hook(bpf_map, 0, map, fmode);
-
security/security.c:5166:9-5166:9: return call_int_hook(bpf_prog, 0, prog);
-
security/security.c:5179:9-5179:9: return call_int_hook(bpf_map_alloc_security, 0, map);
-
security/security.c:5192:9-5192:9: return call_int_hook(bpf_prog_alloc_security, 0, aux);
-
security/security.c:5229:9-5229:9: return call_int_hook(locked_down, 0, what);
-
security/security.c:5245:9-5245:9: return call_int_hook(perf_event_open, 0, attr, type);
-
security/security.c:5258:9-5258:9: return call_int_hook(perf_event_alloc, 0, event);
-
security/security.c:5282:9-5282:9: return call_int_hook(perf_event_read, 0, event);
-
security/security.c:5295:9-5295:9: return call_int_hook(perf_event_write, 0, event);
-
security/security.c:5311:9-5311:9: return call_int_hook(uring_override_creds, 0, new);
-
security/security.c:5324:9-5324:9: return call_int_hook(uring_sqpoll, 0);
-
security/security.c:5337:9-5337:9: return call_int_hook(uring_cmd, 0, ioucmd);