/security/selinux/ss/ |
D | symtab.c | 15 unsigned int size; in symhash() local 20 size = strlen(keyp); in symhash() 21 for (p = keyp; (p - keyp) < size; p++) in symhash() 23 return val & (h->size - 1); in symhash() 36 int symtab_init(struct symtab *s, unsigned int size) in symtab_init() argument 38 s->table = hashtab_create(symhash, symcmp, size); in symtab_init()
|
D | hashtab.c | 13 u32 size) in hashtab_create() argument 22 p->size = size; in hashtab_create() 26 p->htable = kmalloc(sizeof(*(p->htable)) * size, GFP_KERNEL); in hashtab_create() 32 for (i = 0; i < size; i++) in hashtab_create() 101 for (i = 0; i < h->size; i++) { in hashtab_destroy() 128 for (i = 0; i < h->size; i++) { in hashtab_map() 148 for (slots_used = max_chain_len = i = 0; i < h->size; i++) { in hashtab_stat()
|
D | hashtab.h | 23 u32 size; /* number of slots in hash table */ member 44 u32 size);
|
D | symtab.h | 19 int symtab_init(struct symtab *s, unsigned int size);
|
D | policydb.c | 408 info.slots_used, h->size, info.max_chain_len); in symtab_hash_eval()
|
/security/selinux/ |
D | netport.c | 48 int size; member 138 if (sel_netport_hash[idx].size == SEL_NETPORT_HASH_BKT_LIMIT) { in sel_netport_insert() 146 sel_netport_hash[idx].size++; in sel_netport_insert() 245 sel_netport_hash[idx].size = 0; in sel_netport_flush() 270 sel_netport_hash[iter].size = 0; in sel_netport_init()
|
D | netnode.c | 49 unsigned int size; member 190 if (sel_netnode_hash[idx].size == SEL_NETNODE_HASH_BKT_LIMIT) { in sel_netnode_insert() 198 sel_netnode_hash[idx].size++; in sel_netnode_insert() 311 sel_netnode_hash[idx].size = 0; in sel_netnode_flush() 336 sel_netnode_hash[iter].size = 0; in sel_netnode_init()
|
D | selinuxfs.c | 372 static ssize_t sel_write_context(struct file *file, char *buf, size_t size) in sel_write_context() argument 382 length = security_context_to_sid(buf, size, &sid); in sel_write_context() 511 static ssize_t sel_write_access(struct file *file, char *buf, size_t size); 512 static ssize_t sel_write_create(struct file *file, char *buf, size_t size); 513 static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size); 514 static ssize_t sel_write_user(struct file *file, char *buf, size_t size); 515 static ssize_t sel_write_member(struct file *file, char *buf, size_t size); 526 static ssize_t selinux_transaction_write(struct file *file, const char __user *buf, size_t size, lo… in selinux_transaction_write() argument 535 data = simple_transaction_get(file, buf, size); in selinux_transaction_write() 539 rv = write_op[ino](file, data, size); in selinux_transaction_write() [all …]
|
D | hooks.c | 2759 const void *value, size_t size, int flags) in selinux_inode_setxattr() argument 2786 rc = security_context_to_sid(value, size, &newsid); in selinux_inode_setxattr() 2790 rc = security_context_to_sid_force(value, size, &newsid); in selinux_inode_setxattr() 2813 const void *value, size_t size, in selinux_inode_post_setxattr() argument 2826 rc = security_context_to_sid_force(value, size, &newsid); in selinux_inode_post_setxattr() 2869 u32 size; in selinux_inode_getsecurity() local 2890 &size); in selinux_inode_getsecurity() 2892 error = security_sid_to_context(isec->sid, &context, &size); in selinux_inode_getsecurity() 2895 error = size; in selinux_inode_getsecurity() 2906 const void *value, size_t size, int flags) in selinux_inode_setsecurity() argument [all …]
|
/security/ |
D | commoncap.c | 322 int size; in get_vfs_caps_from_disk() local 330 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, in get_vfs_caps_from_disk() 332 if (size == -ENODATA || size == -EOPNOTSUPP) in get_vfs_caps_from_disk() 335 if (size < 0) in get_vfs_caps_from_disk() 336 return size; in get_vfs_caps_from_disk() 338 if (size < sizeof(magic_etc)) in get_vfs_caps_from_disk() 345 if (size != XATTR_CAPS_SZ_1) in get_vfs_caps_from_disk() 350 if (size != XATTR_CAPS_SZ_2) in get_vfs_caps_from_disk() 589 const void *value, size_t size, int flags) in cap_inode_setxattr() argument
|
D | security.c | 544 const void *value, size_t size, int flags) in security_inode_setxattr() argument 548 return security_ops->inode_setxattr(dentry, name, value, size, flags); in security_inode_setxattr() 552 const void *value, size_t size, int flags) in security_inode_post_setxattr() argument 556 security_ops->inode_post_setxattr(dentry, name, value, size, flags); in security_inode_post_setxattr() 597 …inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) in security_inode_setsecurity() argument 601 return security_ops->inode_setsecurity(inode, name, value, size, flags); in security_inode_setsecurity() 926 int security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) in security_setprocattr() argument 928 return security_ops->setprocattr(p, name, value, size); in security_setprocattr() 1012 int security_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) in security_socket_sendmsg() argument 1014 return security_ops->socket_sendmsg(sock, msg, size); in security_socket_sendmsg() [all …]
|
D | capability.c | 229 const void *value, size_t size, int flags) in cap_inode_post_setxattr() argument 250 const void *value, size_t size, int flags) in cap_inode_setsecurity() argument 627 static int cap_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) in cap_socket_sendmsg() argument 633 int size, int flags) in cap_socket_recvmsg() argument 789 size_t size) in cap_setprocattr() argument
|
/security/keys/ |
D | keyring.c | 694 size_t size; in __key_link() local 729 size = sizeof(struct key *) * klist->maxkeys; in __key_link() 730 size += sizeof(*klist); in __key_link() 731 BUG_ON(size > PAGE_SIZE); in __key_link() 734 nklist = kmemdup(klist, size, GFP_KERNEL); in __key_link() 783 size = sizeof(*klist) + sizeof(struct key *) * max; in __key_link() 784 if (size > PAGE_SIZE) in __key_link() 788 nklist = kmalloc(size, GFP_KERNEL); in __key_link()
|
/security/smack/ |
D | smack_lsm.c | 601 const void *value, size_t size, int flags) in smack_inode_setxattr() argument 611 rc = cap_inode_setxattr(dentry, name, value, size, flags); in smack_inode_setxattr() 631 const void *value, size_t size, int flags) in smack_inode_post_setxattr() argument 642 if (size >= SMK_LABELLEN) in smack_inode_post_setxattr() 651 nsp = smk_import(value, size); in smack_inode_post_setxattr() 1425 const void *value, size_t size, int flags) in smack_inode_setsecurity() argument 1433 if (value == NULL || size > SMK_LABELLEN) in smack_inode_setsecurity() 1436 sp = smk_import(value, size); in smack_inode_setsecurity() 2178 void *value, size_t size) in smack_setprocattr() argument 2193 if (value == NULL || size == 0 || size >= SMK_LABELLEN) in smack_setprocattr() [all …]
|