/security/keys/ |
D | user_defined.c | 197 long user_read(const struct key *key, char __user *buffer, size_t buflen) in user_read() argument 206 if (buffer && buflen > 0) { in user_read() 210 if (copy_to_user(buffer, upayload->data, buflen) != 0) in user_read()
|
D | keyctl.c | 460 char __user *buffer, in keyctl_describe_key() argument 513 if (buffer && buflen > 0) { in keyctl_describe_key() 517 if (copy_to_user(buffer, tmpbuf, buflen) != 0) in keyctl_describe_key() 633 long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) in keyctl_read_key() argument 673 ret = key->type->read(key, buffer, buflen); in keyctl_read_key() 1165 char __user *buffer, in keyctl_get_security() argument 1196 if (buffer && buflen > 0 && in keyctl_get_security() 1197 copy_to_user(buffer, "", 1) != 0) in keyctl_get_security() 1201 if (buffer && buflen > 0) { in keyctl_get_security() 1205 if (copy_to_user(buffer, context, buflen) != 0) in keyctl_get_security()
|
D | request_key_auth.c | 75 char __user *buffer, size_t buflen) in request_key_auth_read() argument 85 if (buffer && buflen > 0) { in request_key_auth_read() 89 if (copy_to_user(buffer, rka->callout_info, buflen) != 0) in request_key_auth_read()
|
D | keyring.c | 57 char __user *buffer, size_t buflen); 194 char __user *buffer, size_t buflen) in keyring_read() argument 208 if (buffer && buflen > 0) { in keyring_read() 223 if (copy_to_user(buffer, in keyring_read() 231 buffer += tmp; in keyring_read()
|
D | internal.h | 193 extern long keyctl_get_security(key_serial_t keyid, char __user *buffer,
|
/security/ |
D | device_cgroup.c | 332 int filetype, const char *buffer) in devcgroup_update_access() argument 343 b = buffer; in devcgroup_update_access() 426 const char *buffer) in devcgroup_access_write() argument 432 cft->private, buffer); in devcgroup_access_write()
|
D | security.c | 590 int security_inode_getsecurity(const struct inode *inode, const char *name, void **buffer, bool all… in security_inode_getsecurity() argument 594 return security_ops->inode_getsecurity(inode, name, buffer, alloc); in security_inode_getsecurity() 604 int security_inode_listsecurity(struct inode *inode, char *buffer, size_t buffer_size) in security_inode_listsecurity() argument 608 return security_ops->inode_listsecurity(inode, buffer, buffer_size); in security_inode_listsecurity()
|
D | capability.c | 244 void **buffer, bool alloc) in cap_inode_getsecurity() argument 255 static int cap_inode_listsecurity(struct inode *inode, char *buffer, in cap_inode_listsecurity() argument
|
/security/smack/ |
D | smack_lsm.c | 710 const char *name, void **buffer, in smack_inode_getsecurity() argument 724 *buffer = isp; in smack_inode_getsecurity() 750 *buffer = isp; in smack_inode_getsecurity() 766 static int smack_inode_listsecurity(struct inode *inode, char *buffer, in smack_inode_listsecurity() argument 771 if (buffer != NULL && len <= buffer_size) { in smack_inode_listsecurity() 772 memcpy(buffer, XATTR_NAME_SMACK, len); in smack_inode_listsecurity()
|
/security/selinux/ |
D | hooks.c | 1157 char *buffer, *path, *end; in selinux_proc_get_sid() local 1159 buffer = (char *)__get_free_page(GFP_KERNEL); in selinux_proc_get_sid() 1160 if (!buffer) in selinux_proc_get_sid() 1164 end = buffer+buflen; in selinux_proc_get_sid() 1180 free_page((unsigned long)buffer); in selinux_proc_get_sid() 1884 char *buffer, *path, *end; in selinux_sysctl_get_sid() local 1887 buffer = (char *)__get_free_page(GFP_KERNEL); in selinux_sysctl_get_sid() 1888 if (!buffer) in selinux_sysctl_get_sid() 1892 end = buffer+buflen; in selinux_sysctl_get_sid() 1917 free_page((unsigned long)buffer); in selinux_sysctl_get_sid() [all …]
|