Searched refs:size (Results 1 - 25 of 46) sorted by relevance

12

/security/selinux/ss/
H A Dsymtab.c14 unsigned int size; local
19 size = strlen(keyp);
20 for (p = keyp; (p - keyp) < size; p++)
22 return val & (h->size - 1);
35 int symtab_init(struct symtab *s, unsigned int size) argument
37 s->table = hashtab_create(symhash, symcmp, size);
H A Dsymtab.h19 int symtab_init(struct symtab *s, unsigned int size);
H A Dhashtab.c14 u32 size)
23 p->size = size;
27 p->htable = kmalloc(sizeof(*(p->htable)) * size, GFP_KERNEL);
33 for (i = 0; i < size; i++)
104 for (i = 0; i < h->size; i++) {
131 for (i = 0; i < h->size; i++) {
151 for (slots_used = max_chain_len = i = 0; i < h->size; i++) {
12 hashtab_create(u32 (hash_value)struct hashtab *h, const void *key), int (*keycmp)(struct hashtab *h, const void *key1, const void *key2), u32 size) argument
H A Dhashtab.h23 u32 size; /* number of slots in hash table */ member in struct:hashtab
44 u32 size);
/security/apparmor/include/
H A Dprocattr.h22 int aa_setprocattr_changehat(char *args, size_t size, int test);
H A Dapparmor.h68 void *__aa_kvmalloc(size_t size, gfp_t flags);
70 static inline void *kvmalloc(size_t size) argument
72 return __aa_kvmalloc(size, 0);
75 static inline void *kvzalloc(size_t size) argument
77 return __aa_kvmalloc(size, __GFP_ZERO);
H A Dpolicy_unpack.h37 int aa_unpack(void *udata, size_t size, struct list_head *lh, const char **ns);
H A Ddomain.h22 int size; member in struct:aa_domain
H A Dpolicy.h95 * @size: current size of profiles
101 int size; member in struct:aa_ns_acct
175 * @size: the memory consumed by this profiles rules
215 int size; member in struct:aa_profile
251 ssize_t aa_replace_profiles(void *udata, size_t size, bool noreplace);
252 ssize_t aa_remove_profiles(char *name, size_t size);
/security/apparmor/
H A Dlib.c81 * @size: how many bytes of memory are required
89 void *__aa_kvmalloc(size_t size, gfp_t flags) argument
93 if (size == 0)
97 if (size <= (16*PAGE_SIZE))
98 buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN);
101 buffer = vzalloc(size);
103 buffer = vmalloc(size);
H A Dpolicy_unpack.c112 static bool inbounds(struct aa_ext *e, size_t size) argument
114 return (size <= e->end - e->pos);
118 * aa_u16_chunck - test and do bounds checking for a u16 size based chunk
122 * Returns: the size of chunk found with the read head at the end of the chunk.
126 size_t size = 0; local
130 size = le16_to_cpu(get_unaligned((u16 *) e->pos));
132 if (!inbounds(e, size))
135 e->pos += size;
136 return size;
173 * Check for presence of a tagname, and if present name size
178 size_t size = unpack_u16_chunk(e, &tag); local
225 int size; local
238 u32 size; local
255 size_t size = 0; local
329 size_t size; local
378 int i, size; local
441 int i, size; local
749 aa_unpack(void *udata, size_t size, struct list_head *lh, const char **ns) argument
[all...]
H A Dpath.c156 * @size: size of buffer
162 int size, char **name, const char **info)
165 int error = d_namespace_path(path, buffer, size - adjust, name, flags);
172 strcpy(&buffer[size - 2], "/");
211 int size = 256; local
218 buf = kmalloc(size, GFP_KERNEL);
222 error = get_name_to_buffer(path, flags, buf, size, &str, info);
227 size <<= 1;
228 if (size > aa_g_path_ma
161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument
[all...]
H A Dmatch.c31 * @bsize: size of blob
111 /* accept.size == default.size == base.size */
128 /* next.size == chk.size */
133 /* if equivalence classes then its table size must be 256 */
194 * @size: size of data to unpack
203 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, in argument
[all...]
H A Dprocattr.c34 * Returns: size of string placed in @string else error code on failure
52 /* if the visible ns_name is > 0 increase size for : :// seperator */
109 * @size: size of the args
114 int aa_setprocattr_changehat(char *args, size_t size, int test) argument
132 * at args[size] by setprocattr.
137 char *end = args + size;
H A Dapparmorfs.c76 * @alloc_size: size of user buffer (REQUIRES: @alloc_size >= @copy_size)
77 * @copy_size: size of data to copy from user buffer
117 static ssize_t profile_load(struct file *f, const char __user *buf, size_t size, argument
123 data = aa_simple_write_to_buffer(OP_PROF_LOAD, buf, size, size, pos);
127 error = aa_replace_profiles(data, size, PROF_ADD);
141 size_t size, loff_t *pos)
146 data = aa_simple_write_to_buffer(OP_PROF_REPL, buf, size, size, pos);
149 error = aa_replace_profiles(data, size, PROF_REPLAC
140 profile_replace(struct file *f, const char __user *buf, size_t size, loff_t *pos) argument
162 profile_remove(struct file *f, const char __user *buf, size_t size, loff_t *pos) argument
327 unsigned int i, size = aa_hash_size(); local
[all...]
/security/selinux/
H A Dnetnode.c50 unsigned int size; member in struct:sel_netnode_bkt
175 if (sel_netnode_hash[idx].size == SEL_NETNODE_HASH_BKT_LIMIT) {
184 sel_netnode_hash[idx].size++;
298 sel_netnode_hash[idx].size = 0;
312 sel_netnode_hash[iter].size = 0;
H A Dnetport.c49 int size; member in struct:sel_netport_bkt
123 if (sel_netport_hash[idx].size == SEL_NETPORT_HASH_BKT_LIMIT) {
133 sel_netport_hash[idx].size++;
232 sel_netport_hash[idx].size = 0;
246 sel_netport_hash[iter].size = 0;
H A Dselinuxfs.c248 unsigned long size = vma->vm_end - vma->vm_start; local
253 if (vma->vm_pgoff > 0 || size != PAGE_SIZE)
263 size, vma->vm_page_prot);
569 static ssize_t sel_write_context(struct file *file, char *buf, size_t size) argument
579 length = security_context_to_sid(buf, size, &sid, GFP_KERNEL);
589 printk(KERN_ERR "SELinux: %s: context size (%u) exceeds "
659 static ssize_t sel_write_access(struct file *file, char *buf, size_t size);
660 static ssize_t sel_write_create(struct file *file, char *buf, size_t size);
661 static ssize_t sel_write_relabel(struct file *file, char *buf, size_t size);
662 static ssize_t sel_write_user(struct file *file, char *buf, size_t size);
674 selinux_transaction_write(struct file *file, const char __user *buf, size_t size, loff_t *pos) argument
708 sel_write_access(struct file *file, char *buf, size_t size) argument
757 sel_write_create(struct file *file, char *buf, size_t size) argument
858 sel_write_relabel(struct file *file, char *buf, size_t size) argument
916 sel_write_user(struct file *file, char *buf, size_t size) argument
976 sel_write_member(struct file *file, char *buf, size_t size) argument
[all...]
/security/tomoyo/
H A Dmemory.c65 * @size: Size in byte.
72 void *tomoyo_commit_ok(void *data, const unsigned int size) argument
74 void *ptr = kzalloc(size, GFP_NOFS);
76 memmove(ptr, data, size);
77 memset(data, 0, size);
H A Dgroup.c184 const u8 size = is_ipv6 ? 16 : 4; local
191 if (memcmp(&member->address.ip[0], address, size) > 0 ||
192 memcmp(address, &member->address.ip[1], size) > 0)
H A Daudit.c232 * @len: Buffer size needed for @fmt and @args.
299 int size; member in struct:tomoyo_log
352 * @len: Buffer size needed for @fmt and @args.
378 * The entry->size is used for memory quota checks.
381 entry->size = len + tomoyo_round2(sizeof(*entry));
384 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] + entry->size >=
388 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] += entry->size;
442 tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] -= ptr->size;
/security/integrity/evm/
H A Devm_crypto.c140 int size; local
157 size = vfs_getxattr_alloc(dentry, *xattrname,
159 if (size == -ENOMEM) {
163 if (size < 0)
167 xattr_size = size;
/security/
H A Dcommoncap.c392 int size; local
400 size = inode->i_op->getxattr((struct dentry *)dentry, XATTR_NAME_CAPS, &caps,
402 if (size == -ENODATA || size == -EOPNOTSUPP)
405 if (size < 0)
406 return size;
408 if (size < sizeof(magic_etc))
415 if (size != XATTR_CAPS_SZ_1)
420 if (size != XATTR_CAPS_SZ_2)
625 * @size
634 cap_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
[all...]
H A Dsecurity.c616 const void *value, size_t size, int flags)
622 ret = security_ops->inode_setxattr(dentry, name, value, size, flags);
625 ret = ima_inode_setxattr(dentry, name, value, size);
628 return evm_inode_setxattr(dentry, name, value, size);
632 const void *value, size_t size, int flags)
636 security_ops->inode_post_setxattr(dentry, name, value, size, flags);
637 evm_inode_post_setxattr(dentry, name, value, size);
686 int security_inode_setsecurity(struct inode *inode, const char *name, const void *value, size_t size, int flags) argument
690 return security_ops->inode_setsecurity(inode, name, value, size, flags);
868 int security_kernel_fw_from_file(struct file *file, char *buf, size_t size) argument
615 security_inode_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
631 security_inode_post_setxattr(struct dentry *dentry, const char *name, const void *value, size_t size, int flags) argument
1101 security_setprocattr(struct task_struct *p, char *name, void *value, size_t size) argument
1199 security_socket_sendmsg(struct socket *sock, struct msghdr *msg, int size) argument
1204 security_socket_recvmsg(struct socket *sock, struct msghdr *msg, int size, int flags) argument
[all...]
/security/integrity/ima/
H A Dima_crypto.c35 /* minimum file size for ahash use */
38 MODULE_PARM_DESC(ahash_minsize, "Minimum file size for ahash use");
46 unsigned long long size; local
49 size = memparse(val, NULL);
50 order = get_order(size);
65 MODULE_PARM_DESC(ahash_bufsize, "Maximum ahash buffer size");
142 * @allocated_size: Returned size of actual allocation.
192 * @size: Size of allocated buffer.
194 static void ima_free_pages(void *ptr, size_t size) argument
198 free_pages((unsigned long)ptr, get_order(size));
[all...]

Completed in 2887 milliseconds

12