Home
last modified time | relevance | path

Searched refs:size (Results 1 – 14 of 14) sorted by relevance

/security/selinux/ss/
Dsymtab.c15 unsigned int size; in symhash() local
20 size = strlen(keyp); in symhash()
21 for (p = keyp; (p - keyp) < size; p++) in symhash()
23 return val & (h->size - 1); in symhash()
36 int symtab_init(struct symtab *s, unsigned int size) in symtab_init() argument
38 s->table = hashtab_create(symhash, symcmp, size); in symtab_init()
Dhashtab.c13 u32 size) in hashtab_create() argument
22 p->size = size; in hashtab_create()
26 p->htable = kmalloc(sizeof(*(p->htable)) * size, GFP_KERNEL); in hashtab_create()
32 for (i = 0; i < size; i++) in hashtab_create()
101 for (i = 0; i < h->size; i++) { in hashtab_destroy()
128 for (i = 0; i < h->size; i++) { in hashtab_map()
148 for (slots_used = max_chain_len = i = 0; i < h->size; i++) { in hashtab_stat()
Dhashtab.h23 u32 size; /* number of slots in hash table */ member
44 u32 size);
Dsymtab.h19 int symtab_init(struct symtab *s, unsigned int size);
Dpolicydb.c408 info.slots_used, h->size, info.max_chain_len); in symtab_hash_eval()
/security/selinux/
Dnetport.c48 int size; member
138 if (sel_netport_hash[idx].size == SEL_NETPORT_HASH_BKT_LIMIT) { in sel_netport_insert()
146 sel_netport_hash[idx].size++; in sel_netport_insert()
245 sel_netport_hash[idx].size = 0; in sel_netport_flush()
270 sel_netport_hash[iter].size = 0; in sel_netport_init()
Dnetnode.c49 unsigned int size; member
190 if (sel_netnode_hash[idx].size == SEL_NETNODE_HASH_BKT_LIMIT) { in sel_netnode_insert()
198 sel_netnode_hash[idx].size++; in sel_netnode_insert()
311 sel_netnode_hash[idx].size = 0; in sel_netnode_flush()
336 sel_netnode_hash[iter].size = 0; in sel_netnode_init()
Dselinuxfs.c372 static ssize_t sel_write_context(struct file *file, char *buf, size_t size) in sel_write_context() argument
382 length = security_context_to_sid(buf, size, &sid); in sel_write_context()
511 static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
512 static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
513 static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
514 static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
515 static ssize_t sel_write_member(struct file *file, char *buf, size_t size);
526 static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, lo… in selinux_transaction_write() argument
535 data = simple_transaction_get(file, buf, size); in selinux_transaction_write()
539 rv = write_op[ino](file, data, size); in selinux_transaction_write()
[all …]
Dhooks.c2759 const void *value, size_t size, int flags) in selinux_inode_setxattr() argument
2786 rc = security_context_to_sid(value, size, &newsid); in selinux_inode_setxattr()
2790 rc = security_context_to_sid_force(value, size, &newsid); in selinux_inode_setxattr()
2813 const void *value, size_t size, in selinux_inode_post_setxattr() argument
2826 rc = security_context_to_sid_force(value, size, &newsid); in selinux_inode_post_setxattr()
2869 u32 size; in selinux_inode_getsecurity() local
2890 &size); in selinux_inode_getsecurity()
2892 error = security_sid_to_context(isec->sid, &context, &size); in selinux_inode_getsecurity()
2895 error = size; in selinux_inode_getsecurity()
2906 const void *value, size_t size, int flags) in selinux_inode_setsecurity() argument
[all …]
/security/
Dcommoncap.c322 int size; in get_vfs_caps_from_disk() local
330 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, in get_vfs_caps_from_disk()
332 if (size == -ENODATA || size == -EOPNOTSUPP) in get_vfs_caps_from_disk()
335 if (size < 0) in get_vfs_caps_from_disk()
336 return size; in get_vfs_caps_from_disk()
338 if (size < sizeof(magic_etc)) in get_vfs_caps_from_disk()
345 if (size != XATTR_CAPS_SZ_1) in get_vfs_caps_from_disk()
350 if (size != XATTR_CAPS_SZ_2) in get_vfs_caps_from_disk()
589 const void *value, size_t size, int flags) in cap_inode_setxattr() argument
Dsecurity.c544 const void *value, size_t size, int flags) in security_inode_setxattr() argument
548 return security_ops->inode_setxattr(dentry, name, value, size, flags); in security_inode_setxattr()
552 const void *value, size_t size, int flags) in security_inode_post_setxattr() argument
556 security_ops->inode_post_setxattr(dentry, name, value, size, flags); in security_inode_post_setxattr()
597 …inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) in security_inode_setsecurity() argument
601 return security_ops->inode_setsecurity(inode, name, value, size, flags); in security_inode_setsecurity()
926 int security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) in security_setprocattr() argument
928 return security_ops->setprocattr(p, name, value, size); in security_setprocattr()
1012 int security_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) in security_socket_sendmsg() argument
1014 return security_ops->socket_sendmsg(sock, msg, size); in security_socket_sendmsg()
[all …]
Dcapability.c229 const void *value, size_t size, int flags) in cap_inode_post_setxattr() argument
250 const void *value, size_t size, int flags) in cap_inode_setsecurity() argument
627 static int cap_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) in cap_socket_sendmsg() argument
633 int size, int flags) in cap_socket_recvmsg() argument
789 size_t size) in cap_setprocattr() argument
/security/keys/
Dkeyring.c694 size_t size; in __key_link() local
729 size = sizeof(struct key *) * klist->maxkeys; in __key_link()
730 size += sizeof(*klist); in __key_link()
731 BUG_ON(size > PAGE_SIZE); in __key_link()
734 nklist = kmemdup(klist, size, GFP_KERNEL); in __key_link()
783 size = sizeof(*klist) + sizeof(struct key *) * max; in __key_link()
784 if (size > PAGE_SIZE) in __key_link()
788 nklist = kmalloc(size, GFP_KERNEL); in __key_link()
/security/smack/
Dsmack_lsm.c601 const void *value, size_t size, int flags) in smack_inode_setxattr() argument
611 rc = cap_inode_setxattr(dentry, name, value, size, flags); in smack_inode_setxattr()
631 const void *value, size_t size, int flags) in smack_inode_post_setxattr() argument
642 if (size >= SMK_LABELLEN) in smack_inode_post_setxattr()
651 nsp = smk_import(value, size); in smack_inode_post_setxattr()
1425 const void *value, size_t size, int flags) in smack_inode_setsecurity() argument
1433 if (value == NULL || size > SMK_LABELLEN) in smack_inode_setsecurity()
1436 sp = smk_import(value, size); in smack_inode_setsecurity()
2178 void *value, size_t size) in smack_setprocattr() argument
2193 if (value == NULL || size == 0 || size >= SMK_LABELLEN) in smack_setprocattr()
[all …]