| /security/integrity/platform_certs/ |
| A D | load_powerpc.c | 18 #define extract_esl(db, data, size, offset) \ argument 19 do { db = data + offset; size = size - offset; } while (0) 65 u64 offset = 0; in load_powerpc_certs() local 86 offset = 8; in load_powerpc_certs() 100 extract_esl(db, data, dsize, offset); in load_powerpc_certs() 117 extract_esl(dbx, data, dsize, offset); in load_powerpc_certs() 133 extract_esl(trustedca, data, dsize, offset); in load_powerpc_certs() 149 extract_esl(moduledb, data, dsize, offset); in load_powerpc_certs()
|
| /security/ipe/ |
| A D | policy_fs.c | 48 size_t len, loff_t *offset) in read_pkcs7() argument 91 size_t len, loff_t *offset) in read_policy() argument 128 size_t len, loff_t *offset) in read_name() argument 143 rc = simple_read_from_buffer(data, len, offset, p->parsed->name, in read_name() 166 size_t len, loff_t *offset) in read_version() argument 187 rc = simple_read_from_buffer(data, len, offset, buffer, strsize); in read_version() 209 size_t len, loff_t *offset) in setactive() argument 257 size_t len, loff_t *offset) in getactive() argument 275 rc = simple_read_from_buffer(data, len, offset, str, 1); in getactive() 299 size_t len, loff_t *offset) in update_policy() argument [all …]
|
| A D | fs.c | 30 size_t len, loff_t *offset) in setaudit() argument 57 size_t len, loff_t *offset) in getaudit() argument 63 return simple_read_from_buffer(data, len, offset, result, 1); in getaudit() 78 size_t len, loff_t *offset) in setenforce() argument 109 size_t len, loff_t *offset) in getenforce() argument 115 return simple_read_from_buffer(data, len, offset, result, 1); in getenforce() 137 size_t len, loff_t *offset) in new_policy() argument
|
| /security/lockdown/ |
| A D | lockdown.c | 100 int i, offset = 0; in lockdown_read() local 109 offset += sprintf(temp+offset, "[%s] ", label); in lockdown_read() 111 offset += sprintf(temp+offset, "%s ", label); in lockdown_read() 116 if (offset > 0) in lockdown_read() 117 temp[offset-1] = '\n'; in lockdown_read()
|
| /security/selinux/ss/ |
| A D | ebitmap.c | 114 u32 offset; in ebitmap_netlbl_export() local 128 offset = e_iter->startbit; in ebitmap_netlbl_export() 132 rc = netlbl_catmap_setlong(catmap, offset, in ebitmap_netlbl_export() 137 offset += EBITMAP_UNIT_SIZE; in ebitmap_netlbl_export() 165 u32 offset = 0, idx; in ebitmap_netlbl_import() local 172 if (offset == (u32)-1) in ebitmap_netlbl_import() 177 offset += EBITMAP_UNIT_SIZE; in ebitmap_netlbl_import() 182 offset >= e_iter->startbit + EBITMAP_SIZE) { in ebitmap_netlbl_import() 188 e_iter->startbit = offset - (offset % EBITMAP_SIZE); in ebitmap_netlbl_import() 197 idx = EBITMAP_NODE_INDEX(e_iter, offset); in ebitmap_netlbl_import() [all …]
|
| /security/ |
| A D | lsm_audit.c | 94 int offset, ret = 0; in ipv6_skb_to_auditdata() local 104 offset = skb_network_offset(skb); in ipv6_skb_to_auditdata() 105 offset += sizeof(*ip6); in ipv6_skb_to_auditdata() 107 offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); in ipv6_skb_to_auditdata() 108 if (offset < 0) in ipv6_skb_to_auditdata() 116 th = skb_header_pointer(skb, offset, sizeof(_tcph), &_tcph); in ipv6_skb_to_auditdata() 127 uh = skb_header_pointer(skb, offset, sizeof(_udph), &_udph); in ipv6_skb_to_auditdata() 138 sh = skb_header_pointer(skb, offset, sizeof(_sctph), &_sctph); in ipv6_skb_to_auditdata()
|
| A D | security.c | 250 int offset; in lsm_set_blob_size() local 255 offset = ALIGN(*lbs, sizeof(void *)); in lsm_set_blob_size() 256 *lbs = offset + *need; in lsm_set_blob_size() 257 *need = offset; in lsm_set_blob_size()
|
| /security/integrity/ima/ |
| A D | ima_crypto.c | 328 loff_t i_size, offset; in ima_calc_file_hash_atfm() local 377 for (offset = 0; offset < i_size; offset += rbuf_len) { in ima_calc_file_hash_atfm() 378 if (!rbuf[1] && offset) { in ima_calc_file_hash_atfm() 388 rbuf_len = min_t(loff_t, i_size - offset, rbuf_size[active]); in ima_calc_file_hash_atfm() 389 rc = integrity_kernel_read(file, offset, rbuf[active], in ima_calc_file_hash_atfm() 402 if (rbuf[1] && offset) { in ima_calc_file_hash_atfm() 455 loff_t i_size, offset = 0; in ima_calc_file_hash_tfm() local 477 while (offset < i_size) { in ima_calc_file_hash_tfm() 480 rbuf_len = integrity_kernel_read(file, offset, rbuf, PAGE_SIZE); in ima_calc_file_hash_tfm() 489 offset += rbuf_len; in ima_calc_file_hash_tfm()
|
| A D | ima_template_lib.c | 308 u32 offset = 0; in ima_eventdigest_init_common() local 312 offset += 1 + sprintf(buffer, "%s:%s:", in ima_eventdigest_init_common() 317 offset += 1 + sprintf(buffer, "%s:", in ima_eventdigest_init_common() 322 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 332 offset += hash_digest_size[hash_algo]; in ima_eventdigest_init_common() 334 offset += IMA_DIGEST_SIZE; in ima_eventdigest_init_common() 337 return ima_write_template_field_data(buffer, offset + digestsize, in ima_eventdigest_init_common()
|
| A D | ima_appraise.c | 90 int rc, offset; in ima_fix_xattr() local 94 offset = 1; in ima_fix_xattr() 97 offset = 0; in ima_fix_xattr() 102 &iint->ima_hash->xattr.data[offset], in ima_fix_xattr() 103 (sizeof(iint->ima_hash->xattr) - offset) + in ima_fix_xattr()
|
| A D | ima_policy.c | 2078 int offset = 0; in ima_policy_show() local 2112 offset = 1; in ima_policy_show() 2114 seq_printf(m, pt(Opt_mask), mt(mask_exec) + offset); in ima_policy_show() 2116 seq_printf(m, pt(Opt_mask), mt(mask_write) + offset); in ima_policy_show() 2118 seq_printf(m, pt(Opt_mask), mt(mask_read) + offset); in ima_policy_show() 2120 seq_printf(m, pt(Opt_mask), mt(mask_append) + offset); in ima_policy_show()
|
| /security/tomoyo/ |
| A D | domain.c | 622 int offset = pos % PAGE_SIZE; in tomoyo_environ() local 639 pos += PAGE_SIZE - offset; in tomoyo_environ() 641 while (argv_count && offset < PAGE_SIZE) { in tomoyo_environ() 642 if (!env_page.data[offset++]) in tomoyo_environ() 646 offset = 0; in tomoyo_environ() 649 while (offset < PAGE_SIZE) { in tomoyo_environ() 650 const unsigned char c = env_page.data[offset++]; in tomoyo_environ() 682 offset = 0; in tomoyo_environ() 936 const unsigned int offset = pos % PAGE_SIZE; in tomoyo_dump_page() local 945 memcpy(dump->data + offset, kaddr + offset, in tomoyo_dump_page() [all …]
|
| A D | audit.c | 31 int offset = pos % PAGE_SIZE; in tomoyo_print_bprm() local 48 pos += PAGE_SIZE - offset; in tomoyo_print_bprm() 50 while (offset < PAGE_SIZE) { in tomoyo_print_bprm() 52 const unsigned char c = kaddr[offset++]; in tomoyo_print_bprm() 100 offset = 0; in tomoyo_print_bprm()
|
| A D | condition.c | 114 int offset = pos % PAGE_SIZE; in tomoyo_scan_bprm() local 134 pos += PAGE_SIZE - offset; in tomoyo_scan_bprm() 135 while (offset < PAGE_SIZE) { in tomoyo_scan_bprm() 138 const unsigned char c = kaddr[offset++]; in tomoyo_scan_bprm() 185 offset = 0; in tomoyo_scan_bprm()
|
| /security/integrity/ |
| A D | iint.c | 25 int integrity_kernel_read(struct file *file, loff_t offset, in integrity_kernel_read() argument 28 return __kernel_read(file, addr, count, &offset); in integrity_kernel_read()
|
| A D | integrity.h | 115 int integrity_kernel_read(struct file *file, loff_t offset,
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 130 int offset = 0; in evm_read_xattrs() local 158 sprintf(temp + offset, "%s\n", xattr->name); in evm_read_xattrs() 159 offset += strlen(xattr->name) + 1; in evm_read_xattrs()
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm2.c | 244 off_t offset = TPM_HEADER_SIZE; in tpm2_seal_trusted() local 340 blob_len = tpm_buf_read_u32(&buf, &offset); in tpm2_seal_trusted() 345 if (buf.length - offset < blob_len) { in tpm2_seal_trusted() 350 blob_len = tpm2_key_encode(payload, options, &buf.data[offset], blob_len); in tpm2_seal_trusted()
|
| /security/selinux/ |
| A D | hooks.c | 4481 int offset, ihlen, ret = -EINVAL; in selinux_parse_skb_ipv4() local 4484 offset = skb_network_offset(skb); in selinux_parse_skb_ipv4() 4485 ih = skb_header_pointer(skb, offset, sizeof(_iph), &_iph); in selinux_parse_skb_ipv4() 4507 offset += ihlen; in selinux_parse_skb_ipv4() 4523 offset += ihlen; in selinux_parse_skb_ipv4() 4540 offset += ihlen; in selinux_parse_skb_ipv4() 4564 int ret = -EINVAL, offset; in selinux_parse_skb_ipv6() local 4568 offset = skb_network_offset(skb); in selinux_parse_skb_ipv6() 4578 offset += sizeof(_ipv6h); in selinux_parse_skb_ipv6() 4579 offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); in selinux_parse_skb_ipv6() [all …]
|
| A D | selinuxfs.c | 445 unsigned long offset; in sel_mmap_policy_fault() local 451 offset = vmf->pgoff << PAGE_SHIFT; in sel_mmap_policy_fault() 452 if (offset >= roundup(plm->len, PAGE_SIZE)) in sel_mmap_policy_fault() 455 page = vmalloc_to_page(plm->data + offset); in sel_mmap_policy_fault()
|
| /security/smack/ |
| A D | smack_lsm.c | 4056 int offset; in smk_skb_to_addr_ipv6() local 4066 offset = skb_network_offset(skb); in smk_skb_to_addr_ipv6() 4067 ip6 = skb_header_pointer(skb, offset, sizeof(_ipv6h), &_ipv6h); in smk_skb_to_addr_ipv6() 4073 offset += sizeof(_ipv6h); in smk_skb_to_addr_ipv6() 4074 offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); in smk_skb_to_addr_ipv6() 4075 if (offset < 0) in smk_skb_to_addr_ipv6() 4081 th = skb_header_pointer(skb, offset, sizeof(_tcph), &_tcph); in smk_skb_to_addr_ipv6() 4087 uh = skb_header_pointer(skb, offset, sizeof(_udph), &_udph); in smk_skb_to_addr_ipv6()
|