Lines Matching refs:prop
2765 * @prop: lsm specific information to return
2769 void security_inode_getlsmprop(struct inode *inode, struct lsm_prop *prop)
2771 call_void_hook(inode_getlsmprop, inode, prop);
3312 * @prop: destination for the LSM data
3315 * failure, @prop will be cleared.
3317 void security_cred_getlsmprop(const struct cred *c, struct lsm_prop *prop)
3319 lsmprop_init(prop);
3320 call_void_hook(cred_getlsmprop, c, prop);
3544 * @prop: lsm specific information
3547 * it in @prop.
3549 void security_current_getlsmprop_subj(struct lsm_prop *prop)
3551 lsmprop_init(prop);
3552 call_void_hook(current_getlsmprop_subj, prop);
3559 * @prop: lsm specific information
3562 * return it in @prop.
3564 void security_task_getlsmprop_obj(struct task_struct *p, struct lsm_prop *prop)
3566 lsmprop_init(prop);
3567 call_void_hook(task_getlsmprop_obj, p, prop);
3783 * @prop: pointer to lsm information
3788 void security_ipc_getlsmprop(struct kern_ipc_perm *ipcp, struct lsm_prop *prop)
3790 lsmprop_init(prop);
3791 call_void_hook(ipc_getlsmprop, ipcp, prop);
4343 * @prop: lsm specific information
4346 * Convert a @prop entry to security context. If @cp is NULL the
4353 int security_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp)
4355 return call_int_hook(lsmprop_to_secctx, prop, cp);
5636 * @prop: security label
5647 int security_audit_rule_match(struct lsm_prop *prop, u32 field, u32 op,
5650 return call_int_hook(audit_rule_match, prop, field, op, lsmrule);