Lines Matching refs:security

41  * all security modules to use the same descriptions for auditing
254 /* Process "security=", if given. */
259 * To match the original "security=" behavior, this
269 init_debug("security=%s disabled: %s\n",
293 /* Process "security=", if given. */
299 append_ordered_lsm(lsm, "security=");
328 pr_info("security= is ignored because it is superseded by lsm=\n");
386 * security_init - initializes the security framework
417 __setup("security=", choose_major_lsm);
475 * @lsm: the name of the security module
532 cred->security = NULL;
536 cred->security = kzalloc(blob_sizes.lbs_cred, gfp);
537 if (cred->security == NULL)
609 task->security = NULL;
613 task->security = kzalloc(blob_sizes.lbs_task, GFP_KERNEL);
614 if (task->security == NULL)
630 kip->security = NULL;
634 kip->security = kzalloc(blob_sizes.lbs_ipc, GFP_KERNEL);
635 if (kip->security == NULL)
651 mp->security = NULL;
655 mp->security = kzalloc(blob_sizes.lbs_msg_msg, GFP_KERNEL);
656 if (mp->security == NULL)
1633 kfree(task->security);
1634 task->security = NULL;
1654 * may result in a call here with ->security being NULL.
1656 if (unlikely(cred->security == NULL))
1661 kfree(cred->security);
1662 cred->security = NULL;
1890 kfree(msg->security);
1891 msg->security = NULL;
1909 kfree(msq->security);
1910 msq->security = NULL;
1950 kfree(shp->security);
1951 shp->security = NULL;
1984 kfree(sma->security);
1985 sma->security = NULL;
2105 * Only one module will provide a security context.
2314 int security_tun_dev_alloc_security(void **security)
2316 return call_int_hook(tun_dev_alloc_security, 0, security);
2320 void security_tun_dev_free_security(void *security)
2322 call_void_hook(tun_dev_free_security, security);
2332 int security_tun_dev_attach_queue(void *security)
2334 return call_int_hook(tun_dev_attach_queue, 0, security);
2338 int security_tun_dev_attach(struct sock *sk, void *security)
2340 return call_int_hook(tun_dev_attach, 0, sk, security);
2344 int security_tun_dev_open(void *security)
2346 return call_int_hook(tun_dev_open, 0, security);