/security/selinux/ss/ |
H A D | symtab.c | 14 unsigned int size; local 19 size = strlen(keyp); 20 for (p = keyp; (p - keyp) < size; p++) 22 return val & (h->size - 1); 35 int symtab_init(struct symtab *s, unsigned int size) argument 37 s->table = hashtab_create(symhash, symcmp, size);
|
H A D | symtab.h | 19 int symtab_init(struct symtab *s, unsigned int size);
|
H A D | hashtab.c | 14 u32 size) 23 p->size = size; 27 p->htable = kmalloc(sizeof(*(p->htable)) * size, GFP_KERNEL); 33 for (i = 0; i < size; i++) 104 for (i = 0; i < h->size; i++) { 131 for (i = 0; i < h->size; i++) { 151 for (slots_used = max_chain_len = i = 0; i < h->size; i++) { 12 hashtab_create(u32 (hash_value)struct hashtab *h, const void *key), int (*keycmp)(struct hashtab *h, const void *key1, const void *key2), u32 size) argument
|
H A D | hashtab.h | 23 u32 size; /* number of slots in hash table */ member in struct:hashtab 44 u32 size);
|
/security/apparmor/include/ |
H A D | procattr.h | 22 int aa_setprocattr_changehat(char *args, size_t size, int test);
|
H A D | apparmor.h | 68 void *__aa_kvmalloc(size_t size, gfp_t flags); 70 static inline void *kvmalloc(size_t size) argument 72 return __aa_kvmalloc(size, 0); 75 static inline void *kvzalloc(size_t size) argument 77 return __aa_kvmalloc(size, __GFP_ZERO);
|
H A D | policy_unpack.h | 37 int aa_unpack(void *udata, size_t size, struct list_head *lh, const char **ns);
|
H A D | domain.h | 22 int size; member in struct:aa_domain
|
H A D | policy.h | 95 * @size: current size of profiles 101 int size; member in struct:aa_ns_acct 175 * @size: the memory consumed by this profiles rules 215 int size; member in struct:aa_profile 251 ssize_t aa_replace_profiles(void *udata, size_t size, bool noreplace); 252 ssize_t aa_remove_profiles(char *name, size_t size);
|
/security/apparmor/ |
H A D | lib.c | 81 * @size: how many bytes of memory are required 89 void *__aa_kvmalloc(size_t size, gfp_t flags) argument 93 if (size == 0) 97 if (size <= (16*PAGE_SIZE)) 98 buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN); 101 buffer = vzalloc(size); 103 buffer = vmalloc(size);
|
H A D | policy_unpack.c | 112 static bool inbounds(struct aa_ext *e, size_t size) argument 114 return (size <= e->end - e->pos); 118 * aa_u16_chunck - test and do bounds checking for a u16 size based chunk 122 * Returns: the size of chunk found with the read head at the end of the chunk. 126 size_t size = 0; local 130 size = le16_to_cpu(get_unaligned((u16 *) e->pos)); 132 if (!inbounds(e, size)) 135 e->pos += size; 136 return size; 173 * Check for presence of a tagname, and if present name size 178 size_t size = unpack_u16_chunk(e, &tag); local 225 int size; local 238 u32 size; local 255 size_t size = 0; local 329 size_t size; local 378 int i, size; local 441 int i, size; local 749 aa_unpack(void *udata, size_t size, struct list_head *lh, const char **ns) argument [all...] |
H A D | path.c | 156 * @size: size of buffer 162 int size, char **name, const char **info) 165 int error = d_namespace_path(path, buffer, size - adjust, name, flags); 172 strcpy(&buffer[size - 2], "/"); 211 int size = 256; local 218 buf = kmalloc(size, GFP_KERNEL); 222 error = get_name_to_buffer(path, flags, buf, size, &str, info); 227 size <<= 1; 228 if (size > aa_g_path_ma 161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument [all...] |
H A D | match.c | 31 * @bsize: size of blob 111 /* accept.size == default.size == base.size */ 128 /* next.size == chk.size */ 133 /* if equivalence classes then its table size must be 256 */ 194 * @size: size of data to unpack 203 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, in argument [all...] |
H A D | procattr.c | 34 * Returns: size of string placed in @string else error code on failure 52 /* if the visible ns_name is > 0 increase size for : :// seperator */ 109 * @size: size of the args 114 int aa_setprocattr_changehat(char *args, size_t size, int test) argument 132 * at args[size] by setprocattr. 137 char *end = args + size;
|
H A D | apparmorfs.c | 76 * @alloc_size: size of user buffer (REQUIRES: @alloc_size >= @copy_size) 77 * @copy_size: size of data to copy from user buffer 117 static ssize_t profile_load(struct file *f, const char __user *buf, size_t size, argument 123 data = aa_simple_write_to_buffer(OP_PROF_LOAD, buf, size, size, pos); 127 error = aa_replace_profiles(data, size, PROF_ADD); 141 size_t size, loff_t *pos) 146 data = aa_simple_write_to_buffer(OP_PROF_REPL, buf, size, size, pos); 149 error = aa_replace_profiles(data, size, PROF_REPLAC 140 profile_replace(struct file *f, const char __user *buf, size_t size, loff_t *pos) argument 162 profile_remove(struct file *f, const char __user *buf, size_t size, loff_t *pos) argument 327 unsigned int i, size = aa_hash_size(); local [all...] |
/security/selinux/ |
H A D | netnode.c | 50 unsigned int size; member in struct:sel_netnode_bkt 175 if (sel_netnode_hash[idx].size == SEL_NETNODE_HASH_BKT_LIMIT) { 184 sel_netnode_hash[idx].size++; 298 sel_netnode_hash[idx].size = 0; 312 sel_netnode_hash[iter].size = 0;
|
H A D | netport.c | 49 int size; member in struct:sel_netport_bkt 123 if (sel_netport_hash[idx].size == SEL_NETPORT_HASH_BKT_LIMIT) { 133 sel_netport_hash[idx].size++; 232 sel_netport_hash[idx].size = 0; 246 sel_netport_hash[iter].size = 0;
|
H A D | selinuxfs.c | 248 unsigned long size = vma->vm_end - vma->vm_start; local 253 if (vma->vm_pgoff > 0 || size != PAGE_SIZE) 263 size, vma->vm_page_prot); 569 static ssize_t sel_write_context(struct file *file, char *buf, size_t size) argument 579 length = security_context_to_sid(buf, size, &sid, GFP_KERNEL); 589 printk(KERN_ERR "SELinux: %s: context size (%u) exceeds " 659 static ssize_t sel_write_access(struct file *file, char *buf, size_t size); 660 static ssize_t sel_write_create(struct file *file, char *buf, size_t size); 661 static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size); 662 static ssize_t sel_write_user(struct file *file, char *buf, size_t size); 674 selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos) argument 708 sel_write_access(struct file *file, char *buf, size_t size) argument 757 sel_write_create(struct file *file, char *buf, size_t size) argument 858 sel_write_relabel(struct file *file, char *buf, size_t size) argument 916 sel_write_user(struct file *file, char *buf, size_t size) argument 976 sel_write_member(struct file *file, char *buf, size_t size) argument [all...] |
/security/tomoyo/ |
H A D | memory.c | 65 * @size: Size in byte. 72 void *tomoyo_commit_ok(void *data, const unsigned int size) argument 74 void *ptr = kzalloc(size, GFP_NOFS); 76 memmove(ptr, data, size); 77 memset(data, 0, size);
|
H A D | group.c | 184 const u8 size = is_ipv6 ? 16 : 4; local 191 if (memcmp(&member->address.ip[0], address, size) > 0 || 192 memcmp(address, &member->address.ip[1], size) > 0)
|
H A D | audit.c | 232 * @len: Buffer size needed for @fmt and @args. 299 int size; member in struct:tomoyo_log 352 * @len: Buffer size needed for @fmt and @args. 378 * The entry->size is used for memory quota checks. 381 entry->size = len + tomoyo_round2(sizeof(*entry)); 384 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] + entry->size >= 388 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] += entry->size; 442 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] -= ptr->size;
|
/security/integrity/evm/ |
H A D | evm_crypto.c | 140 int size; local 157 size = vfs_getxattr_alloc(dentry, *xattrname, 159 if (size == -ENOMEM) { 163 if (size < 0) 167 xattr_size = size;
|
/security/ |
H A D | commoncap.c | 392 int size; local 400 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps, 402 if (size == -ENODATA || size == -EOPNOTSUPP) 405 if (size < 0) 406 return size; 408 if (size < sizeof(magic_etc)) 415 if (size != XATTR_CAPS_SZ_1) 420 if (size != XATTR_CAPS_SZ_2) 625 * @size 634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument [all...] |
H A D | security.c | 616 const void *value, size_t size, int flags) 622 ret = security_ops->inode_setxattr(dentry, name, value, size, flags); 625 ret = ima_inode_setxattr(dentry, name, value, size); 628 return evm_inode_setxattr(dentry, name, value, size); 632 const void *value, size_t size, int flags) 636 security_ops->inode_post_setxattr(dentry, name, value, size, flags); 637 evm_inode_post_setxattr(dentry, name, value, size); 686 int security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument 690 return security_ops->inode_setsecurity(inode, name, value, size, flags); 868 int security_kernel_fw_from_file(struct file *file, char *buf, size_t size) argument 615 security_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 631 security_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument 1101 security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument 1199 security_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) argument 1204 security_socket_recvmsg(struct socket *sock, struct msghdr *msg, int size, int flags) argument [all...] |
/security/integrity/ima/ |
H A D | ima_crypto.c | 35 /* minimum file size for ahash use */ 38 MODULE_PARM_DESC(ahash_minsize, "Minimum file size for ahash use"); 46 unsigned long long size; local 49 size = memparse(val, NULL); 50 order = get_order(size); 65 MODULE_PARM_DESC(ahash_bufsize, "Maximum ahash buffer size"); 142 * @allocated_size: Returned size of actual allocation. 192 * @size: Size of allocated buffer. 194 static void ima_free_pages(void *ptr, size_t size) argument 198 free_pages((unsigned long)ptr, get_order(size)); [all...] |