Lines Matching refs:are
11 The APIs described in this book are outdated.
65 of security modules that are active on the system.
67 The LSM security fields are simply ``void*`` pointers.
70 Security blobs that are used by more than one security module are
73 program execution security information, security fields are included in
79 information, security fields are included in :c:type:`struct inode
95 32-bit integer. The security modules are required to map or otherwise
98 LSM hooks are maintained in lists. A list is maintained for each
99 hook, and the hooks are called in the order specified by CONFIG_LSM.
107 which are added to the lists.
113 categories: hooks that are used to manage the security fields and hooks
114 that are used to perform access control. Examples of the first category
116 These hooks are used to allocate
130 blobs, unlike other modules. The reasons are historical and are