/security/apparmor/include/ |
D | label.h | 60 gfp_t gfp); 280 bool aa_label_init(struct aa_label *label, int size, gfp_t gfp); 281 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp); 300 gfp_t gfp); 303 bool aa_update_label_name(struct aa_ns *ns, struct aa_label *label, gfp_t gfp); 313 int flags, gfp_t gfp); 315 struct aa_label *label, int flags, gfp_t gfp); 317 struct aa_label *label, int flags, gfp_t gfp); 319 struct aa_label *label, int flags, gfp_t gfp); 321 gfp_t gfp); [all …]
|
D | secid.h | 30 int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
D | file.h | 55 gfp_t gfp) in aa_alloc_file_ctx() argument 59 ctx = kzalloc(sizeof(struct aa_file_ctx), gfp); in aa_alloc_file_ctx()
|
D | policy.h | 179 gfp_t gfp); 181 const char *base, gfp_t gfp);
|
D | lib.h | 104 char *aa_str_alloc(int size, gfp_t gfp); 200 const char *name, gfp_t gfp);
|
/security/apparmor/ |
D | label.c | 60 struct aa_proxy *aa_alloc_proxy(struct aa_label *label, gfp_t gfp) in aa_alloc_proxy() argument 64 new = kzalloc(sizeof(struct aa_proxy), gfp); in aa_alloc_proxy() 401 bool aa_label_init(struct aa_label *label, int size, gfp_t gfp) in aa_label_init() argument 406 if (aa_alloc_secid(label, gfp) < 0) in aa_label_init() 426 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp) in aa_label_alloc() argument 434 gfp); in aa_label_alloc() 439 if (!aa_label_init(new, size, gfp)) in aa_label_alloc() 443 proxy = aa_alloc_proxy(new, gfp); in aa_label_alloc() 826 int len, gfp_t gfp) in vec_create_and_insert_label() argument 844 new = aa_label_alloc(len, NULL, gfp); in vec_create_and_insert_label() [all …]
|
D | secid.c | 124 int aa_alloc_secid(struct aa_label *label, gfp_t gfp) in aa_alloc_secid() argument 129 idr_preload(gfp); in aa_alloc_secid()
|
D | lib.c | 135 __counted char *aa_str_alloc(int size, gfp_t gfp) in aa_str_alloc() argument 139 str = kmalloc(sizeof(struct counted_str) + size, gfp); in aa_str_alloc() 489 const char *name, gfp_t gfp) in aa_policy_init() argument 495 hname = aa_str_alloc(strlen(prefix) + strlen(name) + 3, gfp); in aa_policy_init() 499 hname = aa_str_alloc(strlen(name) + 1, gfp); in aa_policy_init()
|
D | policy.c | 257 gfp_t gfp) in aa_alloc_profile() argument 263 gfp); in aa_alloc_profile() 267 if (!aa_policy_init(&profile->base, NULL, hname, gfp)) in aa_alloc_profile() 269 if (!aa_label_init(&profile->label, 1, gfp)) in aa_alloc_profile() 274 proxy = aa_alloc_proxy(&profile->label, gfp); in aa_alloc_profile() 503 const char *base, gfp_t gfp) in aa_new_null_profile() argument 513 gfp); in aa_new_null_profile() 521 name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, gfp); in aa_new_null_profile() 534 profile = aa_alloc_profile(name, NULL, gfp); in aa_new_null_profile()
|
D | lsm.c | 65 static int apparmor_cred_alloc_blank(struct cred *cred, gfp_t gfp) in apparmor_cred_alloc_blank() argument 75 gfp_t gfp) in apparmor_cred_prepare() argument
|
/security/selinux/ |
D | xfrm.c | 76 gfp_t gfp) in selinux_xfrm_alloc_user() argument 92 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp); in selinux_xfrm_alloc_user() 102 &ctx->ctx_sid, gfp); in selinux_xfrm_alloc_user() 286 gfp_t gfp) in selinux_xfrm_policy_alloc() argument 288 return selinux_xfrm_alloc_user(ctxp, uctx, gfp); in selinux_xfrm_policy_alloc()
|
D | hooks.c | 3888 gfp_t gfp) in selinux_cred_prepare() argument
|
/security/selinux/include/ |
D | xfrm.h | 15 gfp_t gfp);
|
D | security.h | 272 u32 *out_sid, gfp_t gfp); 275 const char *scontext, u32 *out_sid, gfp_t gfp);
|
/security/ |
D | security.c | 493 static int lsm_cred_alloc(struct cred *cred, gfp_t gfp) in lsm_cred_alloc() argument 500 cred->security = kzalloc(blob_sizes.lbs_cred, gfp); in lsm_cred_alloc() 1525 int security_cred_alloc_blank(struct cred *cred, gfp_t gfp) in security_cred_alloc_blank() argument 1527 int rc = lsm_cred_alloc(cred, gfp); in security_cred_alloc_blank() 1532 rc = call_int_hook(cred_alloc_blank, 0, cred, gfp); in security_cred_alloc_blank() 1553 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp) in security_prepare_creds() argument 1555 int rc = lsm_cred_alloc(new, gfp); in security_prepare_creds() 1560 rc = call_int_hook(cred_prepare, 0, new, old, gfp); in security_prepare_creds() 2230 gfp_t gfp) in security_xfrm_policy_alloc() argument 2232 return call_int_hook(xfrm_policy_alloc_security, 0, ctxp, sec_ctx, gfp); in security_xfrm_policy_alloc()
|
/security/smack/ |
D | smack_lsm.c | 350 gfp_t gfp) in smk_copy_rules() argument 357 nrp = kmem_cache_zalloc(smack_rule_cache, gfp); in smk_copy_rules() 377 gfp_t gfp) in smk_copy_relabel() argument 383 nklep = kzalloc(sizeof(struct smack_known_list_elem), gfp); in smk_copy_relabel() 1910 static int smack_cred_alloc_blank(struct cred *cred, gfp_t gfp) in smack_cred_alloc_blank() argument 1947 gfp_t gfp) in smack_cred_prepare() argument 1955 rc = smk_copy_rules(&new_tsp->smk_rules, &old_tsp->smk_rules, gfp); in smack_cred_prepare() 1960 gfp); in smack_cred_prepare()
|
/security/tomoyo/ |
D | tomoyo.c | 37 gfp_t gfp) in tomoyo_cred_prepare() argument
|
/security/selinux/ss/ |
D | services.c | 1575 gfp_t gfp) in security_context_to_sid() argument 1578 sid, SECSID_NULL, gfp, 0); in security_context_to_sid() 1582 const char *scontext, u32 *sid, gfp_t gfp) in security_context_str_to_sid() argument 1585 sid, gfp); in security_context_str_to_sid()
|