/linux-6.6.21/fs/ceph/ |
D | crypto.c | 75 u32 ctxlen; in ceph_crypt_get_context() local 85 ctxlen = le32_to_cpu(cfa->cfa_blob_len); in ceph_crypt_get_context() 86 if (len < ctxlen) in ceph_crypt_get_context() 89 memcpy(ctx, cfa->cfa_blob, ctxlen); in ceph_crypt_get_context() 90 return ctxlen; in ceph_crypt_get_context()
|
/linux-6.6.21/include/linux/ |
D | security.h | 326 u32 *ctxlen); 485 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen); 486 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen); 487 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen); 757 u32 *ctxlen) in security_dentry_init_security() argument 1391 static inline int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 1395 static inline int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 1399 static inline int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument
|
D | lsm_hook_defs.h | 86 void **ctx, u32 *ctxlen) 276 LSM_HOOK(int, 0, inode_notifysecctx, struct inode *inode, void *ctx, u32 ctxlen) 277 LSM_HOOK(int, 0, inode_setsecctx, struct dentry *dentry, void *ctx, u32 ctxlen) 279 u32 *ctxlen)
|
/linux-6.6.21/fs/fuse/ |
D | dir.c | 466 u32 ctxlen, total_len = sizeof(*header); in get_security_context() local 472 &name, &ctx, &ctxlen); in get_security_context() 477 ctxlen = 0; in get_security_context() 481 if (ctxlen) { in get_security_context() 485 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) in get_security_context() 487 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); in get_security_context() 500 fctx->size = ctxlen; in get_security_context() 506 memcpy(ptr, ctx, ctxlen); in get_security_context()
|
/linux-6.6.21/security/ |
D | security.c | 1554 u32 *ctxlen) in security_dentry_init_security() argument 1565 xattr_name, ctx, ctxlen); in security_dentry_init_security() 3992 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 3994 return call_int_hook(inode_notifysecctx, 0, inode, ctx, ctxlen); in security_inode_notifysecctx() 4014 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 4016 return call_int_hook(inode_setsecctx, 0, dentry, ctx, ctxlen); in security_inode_setsecctx() 4031 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument 4040 rc = hp->hook.inode_getsecctx(inode, ctx, ctxlen); in security_inode_getsecctx()
|
/linux-6.6.21/security/smack/ |
D | smack_lsm.c | 4755 static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in smack_inode_notifysecctx() argument 4758 ctxlen, 0); in smack_inode_notifysecctx() 4761 static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in smack_inode_setsecctx() argument 4764 ctx, ctxlen, 0); in smack_inode_setsecctx() 4767 static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in smack_inode_getsecctx() argument 4772 *ctxlen = strlen(skp->smk_known); in smack_inode_getsecctx()
|
/linux-6.6.21/security/selinux/ |
D | hooks.c | 2860 u32 *ctxlen) in selinux_dentry_init_security() argument 2876 ctxlen); in selinux_dentry_init_security() 6533 static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in selinux_inode_notifysecctx() argument 6536 ctx, ctxlen, 0); in selinux_inode_notifysecctx() 6544 static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in selinux_inode_setsecctx() argument 6547 ctx, ctxlen, 0); in selinux_inode_setsecctx() 6550 static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in selinux_inode_getsecctx() argument 6557 *ctxlen = len; in selinux_inode_getsecctx()
|