/security/selinux/ |
D | netlink.c | 43 static void selnl_add_payload(struct nlmsghdr *nlh, int len, int msgtype, void *data) in selnl_add_payload() argument 49 memset(msg, 0, len); in selnl_add_payload() 57 memset(msg, 0, len); in selnl_add_payload() 69 int len; in selnl_notify() local 74 len = selnl_msglen(msgtype); in selnl_notify() 76 skb = alloc_skb(NLMSG_SPACE(len), GFP_USER); in selnl_notify() 81 nlh = NLMSG_PUT(skb, 0, 0, msgtype, len); in selnl_notify() 82 selnl_add_payload(nlh, len, msgtype, data); in selnl_notify()
|
D | selinuxfs.c | 375 u32 sid, len; in sel_write_context() local 386 length = security_sid_to_context(sid, &canon, &len); in sel_write_context() 390 if (len > SIMPLE_TRANSACTION_LIMIT) { in sel_write_context() 392 "payload max\n", __func__, len); in sel_write_context() 397 memcpy(buf, canon, len); in sel_write_context() 398 length = len; in sel_write_context() 615 u32 len; in sel_write_create() local 645 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create() 649 if (len > SIMPLE_TRANSACTION_LIMIT) { in sel_write_create() 651 "payload max\n", __func__, len); in sel_write_create() [all …]
|
D | hooks.c | 485 u32 len; in selinux_get_mnt_opts() local 522 rc = security_sid_to_context(sbsec->sid, &context, &len); in selinux_get_mnt_opts() 529 rc = security_sid_to_context(sbsec->mntpoint_sid, &context, &len); in selinux_get_mnt_opts() 536 rc = security_sid_to_context(sbsec->def_sid, &context, &len); in selinux_get_mnt_opts() 546 rc = security_sid_to_context(isec->sid, &context, &len); in selinux_get_mnt_opts() 1201 unsigned len = 0; in inode_doinit_with_dentry() local 1246 len = INITCONTEXTLEN; in inode_doinit_with_dentry() 1247 context = kmalloc(len, GFP_NOFS); in inode_doinit_with_dentry() 1254 context, len); in inode_doinit_with_dentry() 1264 len = rc; in inode_doinit_with_dentry() [all …]
|
D | xfrm.c | 172 for (i = sp->len-1; i >= 0; i--) { in selinux_xfrm_decode_session() 413 for (i = 0; i < sp->len; i++) { in selinux_xfrm_sock_rcv_skb()
|
D | avc.c | 605 int len = 0; in avc_audit() local 645 len = u->addr->len-sizeof(short); in avc_audit() 651 audit_log_n_hex(ab, p, len); in avc_audit()
|
/security/selinux/ss/ |
D | context.h | 30 u32 len; /* length of string in bytes */ member 120 dst->len = src->len; in context_cpy() 123 dst->len = 0; in context_cpy() 138 c->len = 0; in context_destroy() 144 if (c1->len && c2->len) in context_cmp() 145 return (c1->len == c2->len && !strcmp(c1->str, c2->str)); in context_cmp() 146 if (c1->len || c2->len) in context_cmp()
|
D | policydb.c | 934 u32 len; in perm_read() local 946 len = le32_to_cpu(buf[0]); in perm_read() 949 key = kmalloc(len + 1, GFP_KERNEL); in perm_read() 954 rc = next_entry(key, fp, len); in perm_read() 957 key[len] = '\0'; in perm_read() 974 u32 len, nel; in common_read() local 987 len = le32_to_cpu(buf[0]); in common_read() 996 key = kmalloc(len + 1, GFP_KERNEL); in common_read() 1001 rc = next_entry(key, fp, len); in common_read() 1004 key[len] = '\0'; in common_read() [all …]
|
D | conditional.c | 217 u32 len; in cond_read_bool() local 234 len = le32_to_cpu(buf[2]); in cond_read_bool() 236 key = kmalloc(len + 1, GFP_KERNEL); in cond_read_bool() 239 rc = next_entry(key, fp, len); in cond_read_bool() 242 key[len] = '\0'; in cond_read_bool() 341 u32 len; in cond_read_av_list() local 346 len = 0; in cond_read_av_list() 351 len = le32_to_cpu(buf[0]); in cond_read_av_list() 352 if (len == 0) in cond_read_av_list() 359 for (i = 0; i < len; i++) { in cond_read_av_list() [all …]
|
D | mls.c | 37 int i, l, len, head, prev; in mls_compute_context_len() local 45 len = 1; /* for the beginning ":" */ in mls_compute_context_len() 48 len += strlen(policydb.p_sens_val_to_name[index_sens - 1]); in mls_compute_context_len() 59 len += strlen(nm) + 1; in mls_compute_context_len() 62 len += strlen(nm) + 1; in mls_compute_context_len() 69 len += strlen(nm) + 1; in mls_compute_context_len() 76 len++; in mls_compute_context_len() 80 return len; in mls_compute_context_len()
|
D | services.c | 791 if (context->len) { in context_struct_to_string() 792 *scontext_len = context->len; in context_struct_to_string() 1037 context.len = scontext_len; in security_context_to_sid_core() 1485 u32 len; in convert_context_handle_invalid_context() local 1487 if (!context_struct_to_string(context, &s, &len)) { in convert_context_handle_invalid_context() 1519 u32 len; in convert_context() local 1532 c->len, &ctx, SECSID_NULL); in convert_context() 1599 if (context_struct_to_string(&oldc, &s, &len)) in convert_context() 1604 c->len = len; in convert_context() 1633 int security_load_policy(void *data, size_t len) in security_load_policy() argument [all …]
|
D | policydb.h | 284 size_t len; member 289 if (bytes > fp->len) in next_entry() 294 fp->len -= bytes; in next_entry()
|
D | sidtab.c | 98 if (force && cur && sid == cur->sid && cur->context.len) in sidtab_search_core() 101 if (cur == NULL || sid != cur->sid || cur->context.len) { in sidtab_search_core() 190 if (context->len) in sidtab_context_to_sid()
|
/security/smack/ |
D | smack_access.c | 205 struct smack_known *smk_import_entry(const char *string, int len) in smk_import_entry() argument 212 if (len <= 0 || len > SMK_MAXLEN) in smk_import_entry() 213 len = SMK_MAXLEN; in smk_import_entry() 218 else if (i >= len || string[i] > '~' || string[i] <= ' ' || in smk_import_entry() 265 char *smk_import(const char *string, int len) in smk_import() argument 269 skp = smk_import_entry(string, len); in smk_import()
|
D | smack_lsm.c | 408 char **name, void **value, size_t *len) in smack_inode_init_security() argument 424 if (len) in smack_inode_init_security() 425 *len = strlen(isp) + 1; in smack_inode_init_security() 769 int len = strlen(XATTR_NAME_SMACK); in smack_inode_listsecurity() local 771 if (buffer != NULL && len <= buffer_size) { in smack_inode_listsecurity() 772 memcpy(buffer, XATTR_NAME_SMACK, len); in smack_inode_listsecurity() 773 return len; in smack_inode_listsecurity() 2423 int __user *optlen, unsigned len) in smack_socket_getpeersec_stream() argument 2432 if (slen > len) in smack_socket_getpeersec_stream()
|
/security/selinux/include/ |
D | conditional.h | 16 int security_get_bools(int *len, char ***names, int **values); 18 int security_set_bools(int len, int *values);
|
D | security.h | 76 int security_load_policy(void *data, size_t len);
|
/security/keys/ |
D | keyctl.c | 29 unsigned len) in key_get_type_from_user() argument 33 ret = strncpy_from_user(type, _type, len); in key_get_type_from_user() 38 if (ret == 0 || ret >= len) in key_get_type_from_user() 44 type[len - 1] = '\0'; in key_get_type_from_user()
|
/security/ |
D | security.c | 365 char **name, void **value, size_t *len) in security_inode_init_security() argument 369 return security_ops->inode_init_security(inode, dir, name, value, len); in security_inode_init_security() 1055 int __user *optlen, unsigned len) in security_socket_getpeersec_stream() argument 1057 return security_ops->socket_getpeersec_stream(sock, optval, optlen, len); in security_socket_getpeersec_stream()
|
D | capability.c | 147 char **name, void **value, size_t *len) in cap_inode_init_security() argument 670 int __user *optlen, unsigned len) in cap_socket_getpeersec_stream() argument
|