/security/integrity/evm/ |
H A D | evm_secfs.c | 29 * @count: maximum to send along 35 size_t count, loff_t *ppos) 44 rc = simple_read_from_buffer(buf, count, ppos, temp, strlen(temp)); 53 * @count: bytes sent 62 size_t count, loff_t *ppos) 70 if (count >= sizeof(temp) || count == 0) 73 if (copy_from_user(temp, buf, count) != 0) 76 temp[count] = '\0'; 87 return count; 34 evm_read_key(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 61 evm_write_key(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument [all...] |
H A D | evm_main.c | 78 int count = 0; local 90 count++; 93 return count;
|
/security/tomoyo/ |
H A D | securityfs_if.c | 31 * @count: Size of @buf. 34 * Returns @count on success, negative value otherwise. 40 size_t count, loff_t *ppos) 44 if (!count || count >= TOMOYO_EXEC_TMPSIZE - 10) 46 data = kzalloc(count + 1, GFP_NOFS); 49 if (copy_from_user(data, buf, count)) { 92 return error ? error : count; 100 * @count: Size of @buf. 106 size_t count, loff_ 39 tomoyo_write_self(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 105 tomoyo_read_self(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument 179 tomoyo_read(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument 195 tomoyo_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument [all...] |
H A D | util.c | 1025 unsigned int count = 0; local 1071 count++; 1073 if (count < tomoyo_profile(domain->ns, domain->profile)->
|
/security/smack/ |
H A D | smackfs.c | 446 * @count: bytes sent 462 size_t count, loff_t *ppos, 484 if (count < SMK_OLOADLEN || count > SMK_LOADLEN) 487 if (count >= PAGE_SIZE) { 488 count = PAGE_SIZE - 1; 493 data = kmalloc(count + 1, GFP_KERNEL); 497 if (copy_from_user(data, buf, count) != 0) { 507 while (count > 0 && (data[count 461 smk_write_rules_list(struct file *file, const char __user *buf, size_t count, loff_t *ppos, struct list_head *rule_list, struct mutex *rule_lock, int format) argument 686 smk_write_load(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 860 smk_set_cipso(struct file *file, const char __user *buf, size_t count, loff_t *ppos, int format) argument 963 smk_write_cipso(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1037 smk_write_cipso2(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1158 smk_write_netlbladdr(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1330 smk_read_doi(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1354 smk_write_doi(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1396 smk_read_direct(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1420 smk_write_direct(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1474 smk_read_mapped(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1498 smk_write_mapped(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1589 smk_write_ambient(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1673 smk_write_onlycap(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1729 smk_read_logging(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1752 smk_write_logging(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1842 smk_write_load_self(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1866 smk_user_access(struct file *file, const char __user *buf, size_t count, loff_t *ppos, int format) argument 1914 smk_write_access(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1970 smk_write_load2(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2047 smk_write_load_self2(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2071 smk_write_access2(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2091 smk_write_revoke_subj(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2173 smk_write_change_rule(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2235 smk_write_syslog(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 2279 smk_read_ptrace(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 2300 smk_write_ptrace(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument [all...] |
/security/apparmor/ |
H A D | procattr.c | 119 int count = 0; local 138 for (count = 0; (hat < end) && count < 16; ++count) { 140 hats[count] = hat; 148 return aa_change_hat(hats, count, token, test);
|
H A D | match.c | 166 * Requires: reference count to dfa == 0 187 struct aa_dfa *dfa = container_of(kref, struct aa_dfa, count); 213 kref_init(&dfa->count);
|
H A D | domain.c | 596 * @hats: vector of hat names to try changing into (MAYBE NULL if @count == 0) 597 * @count: number of hat names in @hats 602 * the @hat_magic in the current task context. If the count == 0 and the 608 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest) argument 639 if (count) { 648 for (i = 0; i < count && !hat; i++)
|
H A D | policy.c | 576 count); 636 struct aa_profile *p = container_of(kref, struct aa_profile, count); 658 kref_init(&profile->replacedby->count); 662 kref_init(&profile->count); 683 * hold a count on them so that they are automatically released when
|
/security/apparmor/include/ |
H A D | domain.h | 32 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest);
|
H A D | policy.h | 71 PFLAG_NS_COUNT = 0x400, /* carries NS ref count */ 96 * @count: current count of profiles (includes null profiles) 102 int count; member in struct:aa_ns_acct 113 * @uniq_id: a unique id count for the profiles in the namespace 155 struct kref count; member in struct:aa_replacedby 162 * @count: reference count of the obj 200 struct kref count; member in struct:aa_profile 276 kref_get(&(p->count)); [all...] |
H A D | match.h | 97 struct kref count; member in struct:aa_dfa 138 kref_put(&dfa->count, aa_dfa_free_kref);
|
/security/selinux/ |
H A D | selinuxfs.c | 132 size_t count, loff_t *ppos) 138 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); 143 size_t count, loff_t *ppos) 151 if (count >= PAGE_SIZE) 165 if (copy_from_user(page, buf, count)) 187 length = count; 203 size_t count, loff_t *ppos) 212 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); 233 size_t count, loff_t *ppos) 239 return simple_read_from_buffer(buf, count, ppo 131 sel_read_enforce(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 142 sel_write_enforce(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 202 sel_read_handle_unknown(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 232 sel_read_handle_status(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 274 sel_write_disable(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 328 sel_read_policyvers(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 352 sel_read_mls(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 435 sel_read_policy(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 504 sel_write_load(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 601 sel_read_checkreqprot(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 611 sel_write_checkreqprot(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1048 sel_read_bool(struct file *filep, char __user *buf, size_t count, loff_t *ppos) argument 1083 sel_write_bool(struct file *filep, const char __user *buf, size_t count, loff_t *ppos) argument 1142 sel_commit_bools_write(struct file *filep, const char __user *buf, size_t count, loff_t *ppos) argument 1310 sel_read_avc_cache_threshold(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1320 sel_write_avc_cache_threshold(struct file *file, const char __user *buf, size_t count, loff_t *ppos) argument 1363 sel_read_avc_hash_stats(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 1494 sel_read_initcon(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument 1559 sel_read_class(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument 1573 sel_read_perm(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument 1587 sel_read_policycap(struct file *file, char __user *buf, size_t count, loff_t *ppos) argument [all...] |
/security/ |
H A D | device_cgroup.c | 608 int count, rc = 0; local 666 for (count = 0; count < sizeof(temp) - 1; count++) { 667 temp[count] = *b; 688 for (count = 0; count < sizeof(temp) - 1; count++) { 689 temp[count] = *b; 702 for (b++, count [all...] |
/security/integrity/ima/ |
H A D | ima_fs.c | 30 static ssize_t ima_show_htable_value(char __user *buf, size_t count, argument 37 return simple_read_from_buffer(buf, count, ppos, tmpbuf, len); 42 size_t count, loff_t *ppos) 44 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); 54 size_t count, loff_t *ppos) 56 return ima_show_htable_value(buf, count, ppos, &ima_htable.len); 40 ima_show_htable_violations(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument 52 ima_show_measurements_count(struct file *filp, char __user *buf, size_t count, loff_t *ppos) argument
|
H A D | ima_crypto.c | 79 char *addr, unsigned long count) 91 ret = file->f_op->read(file, buf, count, &offset); 93 ret = do_sync_read(file, buf, count, &offset); 95 ret = new_sync_read(file, buf, count, &offset); 78 ima_kernel_read(struct file *file, loff_t offset, char *addr, unsigned long count) argument
|
/security/selinux/ss/ |
H A D | ebitmap.c | 340 u32 mapunit, count, startbit, index; local 353 count = le32_to_cpu(buf[2]); 371 for (i = 0; i < count; i++) { 442 u32 count; local 449 count = 0; 454 count++; 460 buf[2] = cpu_to_le32(count);
|
/security/keys/ |
H A D | keyring.c | 420 size_t count; member in struct:keyring_read_iterator_context 431 key->type->name, key->serial, ctx->count, ctx->qty); 433 if (ctx->count >= ctx->qty) 440 ctx->count += sizeof(key->serial); 478 ctx.count = 0; 485 kleave(" = %zu [ok]", ctx.count); 486 return ctx.count; 842 * Returns a pointer to the found key and increments the key usage count if 926 * Returns a pointer to the found key with usage count incremented if 1011 * (ie. it has a zero usage count) */ [all...] |