/security/apparmor/include/ |
H A D | context.h | 40 * @gfp: gfp flags for allocation 44 static inline struct aa_file_cxt *aa_alloc_file_context(gfp_t gfp) argument 46 return kzalloc(sizeof(struct aa_file_cxt), gfp);
|
H A D | audit.h | 136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
|
H A D | file.h | 148 gfp_t gfp, int op, u32 request, const char *name,
|
/security/apparmor/ |
H A D | ipc.c | 15 #include <linux/gfp.h>
|
H A D | capability.c | 17 #include <linux/gfp.h>
|
H A D | audit.c | 164 * @gfp: allocation flags to use 172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument
|
H A D | file.c | 95 * @gfp: allocation flags 107 gfp_t gfp, int op, u32 request, const char *name, 153 return aa_audit(type, profile, gfp, &sa, file_audit_cb); 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument
|
H A D | lsm.c | 58 static int apparmor_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 61 struct aa_task_cxt *cxt = aa_alloc_task_context(gfp); 73 gfp_t gfp) 76 struct aa_task_cxt *cxt = aa_alloc_task_context(gfp); 72 apparmor_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument
|
H A D | policy.c | 896 * @gfp: memory allocation flags 903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, argument 915 return aa_audit(AUDIT_APPARMOR_STATUS, __aa_current_profile(), gfp,
|
/security/integrity/ |
H A D | integrity_audit.c | 14 #include <linux/gfp.h>
|
/security/selinux/ss/ |
H A D | status.c | 13 #include <linux/gfp.h>
|
H A D | services.c | 1454 * @gfp: context for the allocation 1462 gfp_t gfp) 1465 sid, SECSID_NULL, gfp, 0); 1461 security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid, gfp_t gfp) argument
|
/security/selinux/ |
H A D | xfrm.c | 82 gfp_t gfp) 98 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp); 107 rc = security_context_to_sid(ctx->ctx_str, str_len, &ctx->ctx_sid, gfp); 287 gfp_t gfp) 289 return selinux_xfrm_alloc_user(ctxp, uctx, gfp); 80 selinux_xfrm_alloc_user(struct xfrm_sec_ctx **ctxp, struct xfrm_user_sec_ctx *uctx, gfp_t gfp) argument 285 selinux_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp, struct xfrm_user_sec_ctx *uctx, gfp_t gfp) argument
|
H A D | netlabel.c | 32 #include <linux/gfp.h>
|
H A D | hooks.c | 3548 static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 3552 tsec = kzalloc(sizeof(struct task_security_struct), gfp); 3580 gfp_t gfp) 3587 tsec = kmemdup(old_tsec, sizeof(struct task_security_struct), gfp); 3579 selinux_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument
|
/security/selinux/include/ |
H A D | xfrm.h | 14 gfp_t gfp);
|
H A D | security.h | 169 u32 *out_sid, gfp_t gfp);
|
/security/tomoyo/ |
H A D | tomoyo.c | 14 * @gfp: Memory allocation flags. 18 static int tomoyo_cred_alloc_blank(struct cred *new, gfp_t gfp) argument 29 * @gfp: Memory allocation flags. 34 gfp_t gfp) 33 tomoyo_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument
|
/security/ |
H A D | security.c | 838 int security_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 840 return security_ops->cred_alloc_blank(cred, gfp); 848 int security_prepare_creds(struct cred *new, const struct cred *old, gfp_t gfp) argument 850 return security_ops->cred_prepare(new, old, gfp); 1371 gfp_t gfp) 1373 return security_ops->xfrm_policy_alloc_security(ctxp, sec_ctx, gfp); 1369 security_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp, struct xfrm_user_sec_ctx *sec_ctx, gfp_t gfp) argument
|
H A D | capability.c | 396 static int cap_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 405 static int cap_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument 786 gfp_t gfp) 784 cap_xfrm_policy_alloc_security(struct xfrm_sec_ctx **ctxp, struct xfrm_user_sec_ctx *sec_ctx, gfp_t gfp) argument
|
H A D | lsm_audit.c | 17 #include <linux/gfp.h>
|
/security/smack/ |
H A D | smack_lsm.c | 261 struct smack_known *forked, gfp_t gfp) 265 tsp = kzalloc(sizeof(struct task_smack), gfp); 285 gfp_t gfp) 294 nrp = kzalloc(sizeof(struct smack_rule), gfp); 1686 * @gfp: the atomicity of any memory allocations 1692 static int smack_cred_alloc_blank(struct cred *cred, gfp_t gfp) argument 1696 tsp = new_task_smack(NULL, NULL, gfp); 1734 * @gfp: the atomicity of any memory allocations 1739 gfp_t gfp) 1745 new_tsp = new_task_smack(old_tsp->smk_task, old_tsp->smk_task, gfp); 260 new_task_smack(struct smack_known *task, struct smack_known *forked, gfp_t gfp) argument 284 smk_copy_rules(struct list_head *nhead, struct list_head *ohead, gfp_t gfp) argument 1738 smack_cred_prepare(struct cred *new, const struct cred *old, gfp_t gfp) argument [all...] |