/security/selinux/ |
D | ibpkey.c | 50 struct rcu_head rcu; member 122 kfree_rcu(tail, rcu); in sel_ib_pkey_insert() 223 kfree_rcu(pkey, rcu); in sel_ib_pkey_flush()
|
D | netport.c | 57 struct rcu_head rcu; member 131 kfree_rcu(tail, rcu); in sel_netport_insert() 230 kfree_rcu(port, rcu); in sel_netport_flush()
|
D | netnode.c | 58 struct rcu_head rcu; member 182 kfree_rcu(tail, rcu); in sel_netnode_insert() 296 kfree_rcu(node, rcu); in sel_netnode_flush()
|
D | hooks.c | 286 static struct inode_security_struct *inode_security_rcu(struct inode *inode, bool rcu) in inode_security_rcu() argument 290 error = __inode_security_revalidate(inode, NULL, !rcu); in inode_security_rcu() 327 isec = container_of(head, struct inode_security_struct, rcu); in inode_free_rcu() 361 call_rcu(&isec->rcu, inode_free_rcu); in inode_free_security() 3053 bool rcu) in selinux_inode_follow_link() argument 3065 isec = inode_security_rcu(inode, rcu); in selinux_inode_follow_link() 3070 rcu ? MAY_NOT_BLOCK : 0); in selinux_inode_follow_link()
|
/security/keys/ |
D | user_defined.c | 97 payload = container_of(head, struct user_key_payload, rcu); in user_free_payload_rcu() 123 call_rcu(&zap->rcu, user_free_payload_rcu); in user_update() 141 call_rcu(&upayload->rcu, user_free_payload_rcu); in user_revoke()
|
D | trusted.c | 1049 static void trusted_rcu_free(struct rcu_head *rcu) in trusted_rcu_free() argument 1053 p = container_of(rcu, struct trusted_key_payload, rcu); in trusted_rcu_free() 1128 call_rcu(&p->rcu, trusted_rcu_free); in trusted_update()
|
D | keyctl.c | 1516 newwork = &cred->rcu; in keyctl_session_to_parent() 1576 put_cred(container_of(oldwork, struct cred, rcu)); in keyctl_session_to_parent()
|
D | process_keys.c | 848 struct cred *new = container_of(twork, struct cred, rcu); in key_change_session_keyring()
|
/security/yama/ |
D | yama_lsm.c | 39 struct rcu_head rcu; member 128 kfree_rcu(relation, rcu); in yama_relation_cleanup() 165 kfree_rcu(relation, rcu); in yama_ptracer_add()
|
/security/selinux/include/ |
D | objsec.h | 61 struct rcu_head rcu; /* for freeing the inode_security_struct */ member
|
/security/ |
D | device_cgroup.c | 46 struct rcu_head rcu; member 144 kfree_rcu(walk, rcu); in dev_exception_rm() 155 kfree_rcu(ex, rcu); in __dev_exception_clean()
|
D | security.c | 689 bool rcu) in security_inode_follow_link() argument 693 return call_int_hook(inode_follow_link, 0, dentry, inode, rcu); in security_inode_follow_link()
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 830 static void encrypted_rcu_free(struct rcu_head *rcu) in encrypted_rcu_free() argument 834 epayload = container_of(rcu, struct encrypted_key_payload, rcu); in encrypted_rcu_free() 891 call_rcu(&epayload->rcu, encrypted_rcu_free); in encrypted_update()
|
/security/apparmor/include/ |
D | label.h | 132 struct rcu_head rcu; member
|
/security/apparmor/ |
D | label.c | 369 struct aa_label *label = container_of(head, struct aa_label, rcu); in label_free_rcu() 393 call_rcu(&label->rcu, label_free_rcu); in aa_label_kref()
|