Lines Matching refs:security
41 * all security modules to use the same descriptions for auditing
256 /* Process "security=", if given. */
261 * To match the original "security=" behavior, this
271 init_debug("security=%s disabled: %s\n",
295 /* Process "security=", if given. */
301 append_ordered_lsm(lsm, "security=");
330 pr_info("security= is ignored because it is superseded by lsm=\n");
389 * security_init - initializes the security framework
420 __setup("security=", choose_major_lsm);
478 * @lsm: the name of the security module
535 cred->security = NULL;
539 cred->security = kzalloc(blob_sizes.lbs_cred, gfp);
540 if (cred->security == NULL)
612 task->security = NULL;
616 task->security = kzalloc(blob_sizes.lbs_task, GFP_KERNEL);
617 if (task->security == NULL)
633 kip->security = NULL;
637 kip->security = kzalloc(blob_sizes.lbs_ipc, GFP_KERNEL);
638 if (kip->security == NULL)
654 mp->security = NULL;
658 mp->security = kzalloc(blob_sizes.lbs_msg_msg, GFP_KERNEL);
659 if (mp->security == NULL)
1691 kfree(task->security);
1692 task->security = NULL;
1712 * may result in a call here with ->security being NULL.
1714 if (unlikely(cred->security == NULL))
1719 kfree(cred->security);
1720 cred->security = NULL;
1955 kfree(msg->security);
1956 msg->security = NULL;
1974 kfree(msq->security);
1975 msq->security = NULL;
2015 kfree(shp->security);
2016 shp->security = NULL;
2049 kfree(sma->security);
2050 sma->security = NULL;
2170 * Only one module will provide a security context.
2379 int security_tun_dev_alloc_security(void **security)
2381 return call_int_hook(tun_dev_alloc_security, 0, security);
2385 void security_tun_dev_free_security(void *security)
2387 call_void_hook(tun_dev_free_security, security);
2397 int security_tun_dev_attach_queue(void *security)
2399 return call_int_hook(tun_dev_attach_queue, 0, security);
2403 int security_tun_dev_attach(struct sock *sk, void *security)
2405 return call_int_hook(tun_dev_attach, 0, sk, security);
2409 int security_tun_dev_open(void *security)
2411 return call_int_hook(tun_dev_open, 0, security);