/linux-6.3-rc2/include/linux/ |
A D | security.h | 324 u32 *ctxlen); 484 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen); 485 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen); 486 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen); 751 u32 *ctxlen) in security_dentry_init_security() argument 1387 static inline int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 1391 static inline int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 1395 static inline int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument
|
A D | lsm_hook_defs.h | 85 void **ctx, u32 *ctxlen) 273 LSM_HOOK(int, 0, inode_notifysecctx, struct inode *inode, void *ctx, u32 ctxlen) 274 LSM_HOOK(int, 0, inode_setsecctx, struct dentry *dentry, void *ctx, u32 ctxlen) 276 u32 *ctxlen)
|
/linux-6.3-rc2/fs/fuse/ |
A D | dir.c | 474 u32 ctxlen, total_len = sizeof(*header); in get_security_context() local 480 &name, &ctx, &ctxlen); in get_security_context() 485 ctxlen = 0; in get_security_context() 489 if (ctxlen) { in get_security_context() 493 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) in get_security_context() 495 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); in get_security_context() 508 fctx->size = ctxlen; in get_security_context() 514 memcpy(ptr, ctx, ctxlen); in get_security_context()
|
/linux-6.3-rc2/security/ |
A D | security.c | 1093 u32 *ctxlen) in security_dentry_init_security() argument 1103 xattr_name, ctx, ctxlen); in security_dentry_init_security() 2218 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 2220 return call_int_hook(inode_notifysecctx, 0, inode, ctx, ctxlen); in security_inode_notifysecctx() 2224 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 2226 return call_int_hook(inode_setsecctx, 0, dentry, ctx, ctxlen); in security_inode_setsecctx() 2230 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument 2232 return call_int_hook(inode_getsecctx, -EOPNOTSUPP, inode, ctx, ctxlen); in security_inode_getsecctx()
|
/linux-6.3-rc2/security/smack/ |
A D | smack_lsm.c | 4681 static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in smack_inode_notifysecctx() argument 4684 ctxlen, 0); in smack_inode_notifysecctx() 4687 static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in smack_inode_setsecctx() argument 4690 ctx, ctxlen, 0); in smack_inode_setsecctx() 4693 static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in smack_inode_getsecctx() argument 4698 *ctxlen = strlen(skp->smk_known); in smack_inode_getsecctx()
|
/linux-6.3-rc2/security/selinux/ |
A D | hooks.c | 2829 u32 *ctxlen) in selinux_dentry_init_security() argument 2845 ctxlen); in selinux_dentry_init_security() 6578 static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in selinux_inode_notifysecctx() argument 6581 ctx, ctxlen, 0); in selinux_inode_notifysecctx() 6589 static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in selinux_inode_setsecctx() argument 6592 ctx, ctxlen, 0); in selinux_inode_setsecctx() 6595 static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in selinux_inode_getsecctx() argument 6602 *ctxlen = len; in selinux_inode_getsecctx()
|