Searched refs:i_security (Results 1 – 10 of 10) sorted by relevance
49 if (unlikely(!inode->i_security)) in evm_iint_inode()52 return inode->i_security + evm_blob_sizes.lbs_inode; in evm_iint_inode()
209 if (unlikely(!inode->i_security)) in ima_inode_get_iint() 212 iint_sec = inode->i_security + ima_blob_sizes.lbs_inode; in ima_inode_get_iint() 221 if (unlikely(!inode->i_security)) in ima_inode_set_iint() 224 iint_sec = inode->i_security + ima_blob_sizes.lbs_inode; in ima_inode_set_iint()
116 return inode->i_security + landlock_blob_sizes.lbs_inode;
44 return inode->i_security + ipe_blobs.lbs_inode; in ipe_inode()
363 return inode->i_security + smack_blob_sizes.lbs_inode; in smack_inode()
224 inode->i_security = NULL; in lsm_inode_alloc() 228 inode->i_security = kmem_cache_zalloc(lsm_inode_cache, gfp); in lsm_inode_alloc() 229 if (inode->i_security == NULL) in lsm_inode_alloc() 1181 * Allocate and attach a security structure to @inode->i_security. The1182 * i_security field is initialized to NULL when the inode structure is1217 * a call to security_inode_free(). For this reason the inode->i_security1225 if (!inode->i_security) in security_inode_free() 1227 call_rcu((struct rcu_head *)inode->i_security, inode_free_by_rcu); in security_inode_free() 4104 * and attach security information to SOCK_INODE(sock)->i_security. This hook4105 * may be used to update the SOCK_INODE(sock)->i_security fiel[all...]
1356 return in->i_security != NULL; in ceph_security_xattr_wanted()1363 if (!in->i_security) in ceph_security_xattr_deadlock()
366 if ((fattr->valid & NFS_ATTR_FATTR_V4_SECURITY_LABEL) && inode->i_security) { in nfs_setsecurity()
782 void *i_security; member
6539 if (dir->i_security) in btrfs_new_inode_prepare()