/security/apparmor/include/ |
D | label.h | 60 gfp_t gfp); 281 bool aa_label_init(struct aa_label *label, int size, gfp_t gfp); 282 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp); 302 gfp_t gfp); 305 bool aa_update_label_name(struct aa_ns *ns, struct aa_label *label, gfp_t gfp); 315 int flags, gfp_t gfp); 317 struct aa_label *label, int flags, gfp_t gfp); 319 struct aa_label *label, int flags, gfp_t gfp); 321 struct aa_label *label, int flags, gfp_t gfp); 323 gfp_t gfp); [all …]
|
D | secid.h | 30 int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
D | policy.h | 179 gfp_t gfp); 181 const char *base, gfp_t gfp);
|
D | file.h | 55 gfp_t gfp) in aa_alloc_file_ctx() argument 59 ctx = kzalloc(sizeof(struct aa_file_ctx), gfp); in aa_alloc_file_ctx()
|
D | lib.h | 109 char *aa_str_alloc(int size, gfp_t gfp); 205 const char *name, gfp_t gfp);
|
/security/apparmor/ |
D | label.c | 60 struct aa_proxy *aa_alloc_proxy(struct aa_label *label, gfp_t gfp) in aa_alloc_proxy() argument 64 new = kzalloc(sizeof(struct aa_proxy), gfp); in aa_alloc_proxy() 396 bool aa_label_init(struct aa_label *label, int size, gfp_t gfp) in aa_label_init() argument 401 if (aa_alloc_secid(label, gfp) < 0) in aa_label_init() 421 struct aa_label *aa_label_alloc(int size, struct aa_proxy *proxy, gfp_t gfp) in aa_label_alloc() argument 429 gfp); in aa_label_alloc() 434 if (!aa_label_init(new, size, gfp)) in aa_label_alloc() 438 proxy = aa_alloc_proxy(new, gfp); in aa_label_alloc() 854 int len, gfp_t gfp) in vec_create_and_insert_label() argument 872 new = aa_label_alloc(len, NULL, gfp); in vec_create_and_insert_label() [all …]
|
D | secid.c | 124 int aa_alloc_secid(struct aa_label *label, gfp_t gfp) in aa_alloc_secid() argument 129 idr_preload(gfp); in aa_alloc_secid()
|
D | lib.c | 135 __counted char *aa_str_alloc(int size, gfp_t gfp) in aa_str_alloc() argument 139 str = kmalloc(sizeof(struct counted_str) + size, gfp); in aa_str_alloc() 489 const char *name, gfp_t gfp) in aa_policy_init() argument 495 hname = aa_str_alloc(strlen(prefix) + strlen(name) + 3, gfp); in aa_policy_init() 499 hname = aa_str_alloc(strlen(name) + 1, gfp); in aa_policy_init()
|
D | policy.c | 258 gfp_t gfp) in aa_alloc_profile() argument 264 gfp); in aa_alloc_profile() 268 if (!aa_policy_init(&profile->base, NULL, hname, gfp)) in aa_alloc_profile() 270 if (!aa_label_init(&profile->label, 1, gfp)) in aa_alloc_profile() 275 proxy = aa_alloc_proxy(&profile->label, gfp); in aa_alloc_profile() 504 const char *base, gfp_t gfp) in aa_new_null_profile() argument 514 gfp); in aa_new_null_profile() 522 name = kmalloc(strlen(parent->base.hname) + 2 + 7 + 8, gfp); in aa_new_null_profile() 535 profile = aa_alloc_profile(name, NULL, gfp); in aa_new_null_profile()
|
D | lsm.c | 75 static int apparmor_cred_alloc_blank(struct cred *cred, gfp_t gfp) in apparmor_cred_alloc_blank() argument 85 gfp_t gfp) in apparmor_cred_prepare() argument
|
/security/selinux/ |
D | xfrm.c | 76 gfp_t gfp) in selinux_xfrm_alloc_user() argument 92 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp); in selinux_xfrm_alloc_user() 102 &ctx->ctx_sid, gfp); in selinux_xfrm_alloc_user() 287 gfp_t gfp) in selinux_xfrm_policy_alloc() argument 289 return selinux_xfrm_alloc_user(ctxp, uctx, gfp); in selinux_xfrm_policy_alloc()
|
D | hooks.c | 3997 gfp_t gfp) in selinux_cred_prepare() argument
|
/security/selinux/include/ |
D | xfrm.h | 15 gfp_t gfp);
|
D | security.h | 340 u32 *out_sid, gfp_t gfp); 343 const char *scontext, u32 *out_sid, gfp_t gfp);
|
/security/ |
D | security.c | 493 static int lsm_cred_alloc(struct cred *cred, gfp_t gfp) in lsm_cred_alloc() argument 500 cred->security = kzalloc(blob_sizes.lbs_cred, gfp); in lsm_cred_alloc() 1609 int security_cred_alloc_blank(struct cred *cred, gfp_t gfp) in security_cred_alloc_blank() argument 1611 int rc = lsm_cred_alloc(cred, gfp); in security_cred_alloc_blank() 1616 rc = call_int_hook(cred_alloc_blank, 0, cred, gfp); in security_cred_alloc_blank() 1637 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp) in security_prepare_creds() argument 1639 int rc = lsm_cred_alloc(new, gfp); in security_prepare_creds() 1644 rc = call_int_hook(cred_prepare, 0, new, old, gfp); in security_prepare_creds() 2399 gfp_t gfp) in security_xfrm_policy_alloc() argument 2401 return call_int_hook(xfrm_policy_alloc_security, 0, ctxp, sec_ctx, gfp); in security_xfrm_policy_alloc()
|
/security/smack/ |
D | smack_lsm.c | 346 gfp_t gfp) in smk_copy_rules() argument 353 nrp = kmem_cache_zalloc(smack_rule_cache, gfp); in smk_copy_rules() 373 gfp_t gfp) in smk_copy_relabel() argument 379 nklep = kzalloc(sizeof(struct smack_known_list_elem), gfp); in smk_copy_relabel() 1927 static int smack_cred_alloc_blank(struct cred *cred, gfp_t gfp) in smack_cred_alloc_blank() argument 1964 gfp_t gfp) in smack_cred_prepare() argument 1972 rc = smk_copy_rules(&new_tsp->smk_rules, &old_tsp->smk_rules, gfp); in smack_cred_prepare() 1977 gfp); in smack_cred_prepare()
|
/security/tomoyo/ |
D | tomoyo.c | 37 gfp_t gfp) in tomoyo_cred_prepare() argument
|
/security/selinux/ss/ |
D | services.c | 1604 gfp_t gfp) in security_context_to_sid() argument 1607 sid, SECSID_NULL, gfp, 0); in security_context_to_sid() 1611 const char *scontext, u32 *sid, gfp_t gfp) in security_context_str_to_sid() argument 1614 sid, gfp); in security_context_str_to_sid()
|