/security/apparmor/include/ |
D | label.h | 64 gfp_t gfp); 285 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp); 304 gfp_t gfp); 307 bool aa_update_label_name(struct aa_ns *ns, struct aa_label *label, gfp_t gfp); 317 int flags, gfp_t gfp); 319 struct aa_label *label, int flags, gfp_t gfp); 321 struct aa_label *label, int flags, gfp_t gfp); 323 struct aa_label *label, int flags, gfp_t gfp); 325 gfp_t gfp); 326 void aa_label_audit(struct audit_buffer *ab, struct aa_label *label, gfp_t gfp); [all …]
|
D | policy.h | 175 gfp_t gfp); 177 const char *base, gfp_t gfp);
|
D | file.h | 56 gfp_t gfp) in aa_alloc_file_ctx() argument 60 ctx = kzalloc(sizeof(struct aa_file_ctx), gfp); in aa_alloc_file_ctx()
|
D | lib.h | 115 char *aa_str_alloc(int size, gfp_t gfp); 211 const char *name, gfp_t gfp);
|
/security/apparmor/ |
D | label.c | 64 struct aa_proxy *aa_alloc_proxy(struct aa_label *label, gfp_t gfp) in aa_alloc_proxy() argument 68 new = kzalloc(sizeof(struct aa_proxy), gfp); in aa_alloc_proxy() 431 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp) in aa_label_alloc() argument 439 gfp); in aa_label_alloc() 448 proxy = aa_alloc_proxy(new, gfp); in aa_label_alloc() 831 int len, gfp_t gfp) in vec_create_and_insert_label() argument 849 new = aa_label_alloc(len, NULL, gfp); in vec_create_and_insert_label() 865 gfp_t gfp) in aa_vec_find_or_create_label() argument 872 return vec_create_and_insert_label(vec, len, gfp); in aa_vec_find_or_create_label() 1196 gfp_t gfp) in aa_label_merge() argument [all …]
|
D | lib.c | 139 __counted char *aa_str_alloc(int size, gfp_t gfp) in aa_str_alloc() argument 143 str = kmalloc(sizeof(struct counted_str) + size, gfp); in aa_str_alloc() 489 const char *name, gfp_t gfp) in aa_policy_init() argument 495 hname = aa_str_alloc(strlen(prefix) + strlen(name) + 3, gfp); in aa_policy_init() 499 hname = aa_str_alloc(strlen(name) + 1, gfp); in aa_policy_init()
|
D | policy.c | 255 gfp_t gfp) in aa_alloc_profile() argument 261 gfp); in aa_alloc_profile() 265 if (!aa_policy_init(&profile->base, NULL, hname, gfp)) in aa_alloc_profile() 272 proxy = aa_alloc_proxy(&profile->label, gfp); in aa_alloc_profile() 501 const char *base, gfp_t gfp) in aa_new_null_profile() argument 511 gfp); in aa_new_null_profile() 519 name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, gfp); in aa_new_null_profile() 532 profile = aa_alloc_profile(name, NULL, gfp); in aa_new_null_profile()
|
D | lsm.c | 65 static int apparmor_cred_alloc_blank(struct cred *cred, gfp_t gfp) in apparmor_cred_alloc_blank() argument 68 struct aa_task_ctx *ctx = aa_alloc_task_context(gfp); in apparmor_cred_alloc_blank() 81 gfp_t gfp) in apparmor_cred_prepare() argument 84 struct aa_task_ctx *ctx = aa_alloc_task_context(gfp); in apparmor_cred_prepare()
|
/security/selinux/ |
D | xfrm.c | 79 gfp_t gfp) in selinux_xfrm_alloc_user() argument 95 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp); in selinux_xfrm_alloc_user() 104 rc = security_context_to_sid(ctx->ctx_str, str_len, &ctx->ctx_sid, gfp); in selinux_xfrm_alloc_user() 284 gfp_t gfp) in selinux_xfrm_policy_alloc() argument 286 return selinux_xfrm_alloc_user(ctxp, uctx, gfp); in selinux_xfrm_policy_alloc()
|
D | hooks.c | 3827 static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp) in selinux_cred_alloc_blank() argument 3831 tsec = kzalloc(sizeof(struct task_security_struct), gfp); in selinux_cred_alloc_blank() 3859 gfp_t gfp) in selinux_cred_prepare() argument 3866 tsec = kmemdup(old_tsec, sizeof(struct task_security_struct), gfp); in selinux_cred_prepare()
|
/security/selinux/include/ |
D | security.h | 173 u32 *out_sid, gfp_t gfp); 175 int security_context_str_to_sid(const char *scontext, u32 *out_sid, gfp_t gfp);
|
D | xfrm.h | 15 gfp_t gfp);
|
/security/tomoyo/ |
D | tomoyo.c | 19 static int tomoyo_cred_alloc_blank(struct cred *new, gfp_t gfp) in tomoyo_cred_alloc_blank() argument 35 gfp_t gfp) in tomoyo_cred_prepare() argument
|
/security/ |
D | security.c | 991 int security_cred_alloc_blank(struct cred *cred, gfp_t gfp) in security_cred_alloc_blank() argument 993 return call_int_hook(cred_alloc_blank, 0, cred, gfp); in security_cred_alloc_blank() 1008 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp) in security_prepare_creds() argument 1010 return call_int_hook(cred_prepare, 0, new, old, gfp); in security_prepare_creds() 1574 gfp_t gfp) in security_xfrm_policy_alloc() argument 1576 return call_int_hook(xfrm_policy_alloc_security, 0, ctxp, sec_ctx, gfp); in security_xfrm_policy_alloc()
|
/security/smack/ |
D | smack_lsm.c | 319 struct smack_known *forked, gfp_t gfp) in new_task_smack() argument 323 tsp = kzalloc(sizeof(struct task_smack), gfp); in new_task_smack() 345 gfp_t gfp) in smk_copy_rules() argument 352 nrp = kzalloc(sizeof(struct smack_rule), gfp); in smk_copy_rules() 372 gfp_t gfp) in smk_copy_relabel() argument 378 nklep = kzalloc(sizeof(struct smack_known_list_elem), gfp); in smk_copy_relabel() 1959 static int smack_cred_alloc_blank(struct cred *cred, gfp_t gfp) in smack_cred_alloc_blank() argument 1963 tsp = new_task_smack(NULL, NULL, gfp); in smack_cred_alloc_blank() 2008 gfp_t gfp) in smack_cred_prepare() argument 2014 new_tsp = new_task_smack(old_tsp->smk_task, old_tsp->smk_task, gfp); in smack_cred_prepare() [all …]
|
/security/selinux/ss/ |
D | services.c | 1479 gfp_t gfp) in security_context_to_sid() argument 1482 sid, SECSID_NULL, gfp, 0); in security_context_to_sid() 1485 int security_context_str_to_sid(const char *scontext, u32 *sid, gfp_t gfp) in security_context_str_to_sid() argument 1487 return security_context_to_sid(scontext, strlen(scontext), sid, gfp); in security_context_str_to_sid()
|