Lines Matching refs:hooks
513 * security_add_hooks - Add a modules hooks to the hook lists.
514 * @hooks: the hooks to add
515 * @count: the number of hooks to add
518 * Each LSM has to register its hooks with the infrastructure.
520 void __init security_add_hooks(struct security_hook_list *hooks, int count,
526 hooks[i].lsm = lsm;
527 hlist_add_tail_rcu(&hooks[i].list, hooks[i].head);
856 * during an execve in the set_security or apply_creds hooks of tracing check
1609 * hooks called by the VFS.
4094 * The @unix_stream_connect and @unix_may_send hooks were necessary because
4098 * and permission hooks in inode_security_ops), binding and connecting to
4101 * using only the socket layer hooks, since we need to know the actual target
4121 * The @unix_stream_connect and @unix_may_send hooks were necessary because
4125 * and permission hooks in inode_security_ops), binding and connecting to
4128 * using only the socket layer hooks, since we need to know the actual target
4372 * Netfilter's IP input hooks since it is the first time that the incoming
4777 * security_socket_post_create() LSM hooks.