scontext_len 706 security/selinux/avc.c u32 scontext_len; scontext_len 710 security/selinux/avc.c &scontext_len); scontext_len 719 security/selinux/avc.c &scontext_len); scontext_len 734 security/selinux/avc.c &scontext_len); scontext_len 736 security/selinux/avc.c if (scontext_len && scontext[scontext_len - 1] == '\0') scontext_len 737 security/selinux/avc.c scontext_len--; scontext_len 739 security/selinux/avc.c audit_log_n_untrustedstring(ab, scontext, scontext_len); scontext_len 744 security/selinux/avc.c &scontext_len); scontext_len 746 security/selinux/avc.c if (scontext_len && scontext[scontext_len - 1] == '\0') scontext_len 747 security/selinux/avc.c scontext_len--; scontext_len 749 security/selinux/avc.c audit_log_n_untrustedstring(ab, scontext, scontext_len); scontext_len 5068 security/selinux/hooks.c u32 scontext_len; scontext_len 5080 security/selinux/hooks.c &scontext_len); scontext_len 5084 security/selinux/hooks.c if (scontext_len > len) { scontext_len 5089 security/selinux/hooks.c if (copy_to_user(optval, scontext, scontext_len)) scontext_len 5093 security/selinux/hooks.c if (put_user(scontext_len, optlen)) scontext_len 254 security/selinux/include/security.h char **scontext, u32 *scontext_len); scontext_len 257 security/selinux/include/security.h u32 sid, char **scontext, u32 *scontext_len); scontext_len 260 security/selinux/include/security.h u32 sid, char **scontext, u32 *scontext_len); scontext_len 263 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext_len 270 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext_len 274 security/selinux/include/security.h const char *scontext, u32 scontext_len, scontext_len 92 security/selinux/ss/services.c u32 *scontext_len); scontext_len 1210 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext_len 1216 security/selinux/ss/services.c *scontext_len = 0; scontext_len 1219 security/selinux/ss/services.c *scontext_len = context->len; scontext_len 1229 security/selinux/ss/services.c *scontext_len += strlen(sym_name(p, SYM_USERS, context->user - 1)) + 1; scontext_len 1230 security/selinux/ss/services.c *scontext_len += strlen(sym_name(p, SYM_ROLES, context->role - 1)) + 1; scontext_len 1231 security/selinux/ss/services.c *scontext_len += strlen(sym_name(p, SYM_TYPES, context->type - 1)) + 1; scontext_len 1232 security/selinux/ss/services.c *scontext_len += mls_compute_context_len(p, context); scontext_len 1238 security/selinux/ss/services.c scontextp = kmalloc(*scontext_len, GFP_ATOMIC); scontext_len 1269 security/selinux/ss/services.c u32 *scontext_len, int force, scontext_len 1279 security/selinux/ss/services.c *scontext_len = 0; scontext_len 1285 security/selinux/ss/services.c *scontext_len = strlen(initial_sid_to_string[sid]) + 1; scontext_len 1289 security/selinux/ss/services.c *scontext_len, GFP_ATOMIC); scontext_len 1319 security/selinux/ss/services.c scontext_len); scontext_len 1338 security/selinux/ss/services.c u32 sid, char **scontext, u32 *scontext_len) scontext_len 1341 security/selinux/ss/services.c scontext_len, 0, 0); scontext_len 1345 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext_len 1348 security/selinux/ss/services.c scontext_len, 1, 0); scontext_len 1365 security/selinux/ss/services.c char **scontext, u32 *scontext_len) scontext_len 1368 security/selinux/ss/services.c scontext_len, 1, 1); scontext_len 1453 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext_len 1464 security/selinux/ss/services.c if (!scontext_len) scontext_len 1468 security/selinux/ss/services.c scontext2 = kmemdup_nul(scontext, scontext_len, gfp_flags); scontext_len 1527 security/selinux/ss/services.c const char *scontext, u32 scontext_len, u32 *sid, scontext_len 1530 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len, scontext_len 1560 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext_len 1563 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len, scontext_len 1568 security/selinux/ss/services.c const char *scontext, u32 scontext_len, scontext_len 1571 security/selinux/ss/services.c return security_context_to_sid_core(state, scontext, scontext_len,