/security/smack/ |
D | smackfs.c | 444 size_t count, loff_t *ppos, in smk_write_rules_list() argument 466 if (count != SMK_OLOADLEN && count != SMK_LOADLEN) in smk_write_rules_list() 470 datalen = count + 1; in smk_write_rules_list() 476 if (copy_from_user(data, buf, count) != 0) { in smk_write_rules_list() 491 data[count] = '\0'; in smk_write_rules_list() 495 data[count] = '\0'; in smk_write_rules_list() 502 if (count == (SMK_OLOADLEN)) in smk_write_rules_list() 518 rc = count; in smk_write_rules_list() 659 size_t count, loff_t *ppos) in smk_write_load() argument 669 return smk_write_rules_list(file, buf, count, ppos, NULL, NULL, in smk_write_load() [all …]
|
/security/tomoyo/ |
D | securityfs_if.c | 40 size_t count, loff_t *ppos) in tomoyo_write_self() argument 44 if (!count || count >= TOMOYO_EXEC_TMPSIZE - 10) in tomoyo_write_self() 46 data = kzalloc(count + 1, GFP_NOFS); in tomoyo_write_self() 49 if (copy_from_user(data, buf, count)) { in tomoyo_write_self() 92 return error ? error : count; in tomoyo_write_self() 106 size_t count, loff_t *ppos) in tomoyo_read_self() argument 111 if (pos >= len || !count) in tomoyo_read_self() 114 if (count < len) in tomoyo_read_self() 115 len = count; in tomoyo_read_self() 179 static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, in tomoyo_read() argument [all …]
|
D | Kconfig | 16 int "Default maximal count for learning mode" 29 int "Default maximal count for audit log"
|
D | util.c | 1025 unsigned int count = 0; in tomoyo_domain_quota_is_ok() local 1071 count++; in tomoyo_domain_quota_is_ok() 1073 if (count < tomoyo_profile(domain->ns, domain->profile)-> in tomoyo_domain_quota_is_ok()
|
/security/integrity/evm/ |
D | evm_secfs.c | 33 size_t count, loff_t *ppos) in evm_read_key() argument 42 rc = simple_read_from_buffer(buf, count, ppos, temp, strlen(temp)); in evm_read_key() 60 size_t count, loff_t *ppos) in evm_write_key() argument 68 if (count >= sizeof(temp) || count == 0) in evm_write_key() 71 if (copy_from_user(temp, buf, count) != 0) in evm_write_key() 74 temp[count] = '\0'; in evm_write_key() 85 return count; in evm_write_key()
|
D | evm_main.c | 59 int count = 0; in evm_find_protected_xattrs() local 71 count++; in evm_find_protected_xattrs() 74 return count; in evm_find_protected_xattrs()
|
/security/selinux/ |
D | selinuxfs.c | 130 size_t count, loff_t *ppos) in sel_read_enforce() argument 136 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); in sel_read_enforce() 141 size_t count, loff_t *ppos) in sel_write_enforce() argument 149 if (count >= PAGE_SIZE) in sel_write_enforce() 163 if (copy_from_user(page, buf, count)) in sel_write_enforce() 185 length = count; in sel_write_enforce() 201 size_t count, loff_t *ppos) in sel_read_handle_unknown() argument 210 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); in sel_read_handle_unknown() 231 size_t count, loff_t *ppos) in sel_read_handle_status() argument 237 return simple_read_from_buffer(buf, count, ppos, in sel_read_handle_status() [all …]
|
/security/apparmor/ |
D | procattr.c | 119 int count = 0; in aa_setprocattr_changehat() local 138 for (count = 0; (hat < end) && count < 16; ++count) { in aa_setprocattr_changehat() 140 hats[count] = hat; in aa_setprocattr_changehat() 148 return aa_change_hat(hats, count, token, test); in aa_setprocattr_changehat()
|
D | policy.c | 145 kref_init(&policy->count); in policy_init() 343 free_namespace(container_of(kref, struct aa_namespace, base.count)); in aa_free_namespace_kref() 764 if (atomic_dec_and_test(&p->base.count.refcount)) { in free_profile() 788 base.count); in aa_free_profile_kref()
|
D | match.c | 186 struct aa_dfa *dfa = container_of(kref, struct aa_dfa, count); in aa_dfa_free_kref() 212 kref_init(&dfa->count); in aa_dfa_unpack()
|
D | domain.c | 616 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest) in aa_change_hat() argument 647 if (count) { in aa_change_hat() 653 for (i = 0; i < count && !hat; i++) in aa_change_hat()
|
/security/apparmor/include/ |
D | policy.h | 83 struct kref count; member 98 int count; member 217 kref_get(&c->count); in aa_get_common() 232 kref_get(&(ns->base.count)); in aa_get_namespace() 246 kref_put(&ns->base.count, aa_free_namespace_kref); in aa_put_namespace() 293 kref_get(&(p->base.count)); in aa_get_profile() 305 kref_put(&p->base.count, aa_free_profile_kref); in aa_put_profile()
|
D | match.h | 92 struct kref count; member 133 kref_put(&dfa->count, aa_dfa_free_kref); in aa_put_dfa()
|
D | domain.h | 32 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest);
|
/security/ |
D | device_cgroup.c | 545 int count, rc = 0; in devcgroup_update_access() local 607 for (count = 0; count < sizeof(temp) - 1; count++) { in devcgroup_update_access() 608 temp[count] = *b; in devcgroup_update_access() 629 for (count = 0; count < sizeof(temp) - 1; count++) { in devcgroup_update_access() 630 temp[count] = *b; in devcgroup_update_access() 643 for (b++, count = 0; count < 3; count++, b++) { in devcgroup_update_access() 656 count = 3; in devcgroup_update_access()
|
/security/integrity/ima/ |
D | ima_fs.c | 30 static ssize_t ima_show_htable_value(char __user *buf, size_t count, in ima_show_htable_value() argument 37 return simple_read_from_buffer(buf, count, ppos, tmpbuf, len); in ima_show_htable_value() 42 size_t count, loff_t *ppos) in ima_show_htable_violations() argument 44 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations() 54 size_t count, loff_t *ppos) in ima_show_measurements_count() argument 56 return ima_show_htable_value(buf, count, ppos, &ima_htable.len); in ima_show_measurements_count()
|
/security/selinux/ss/ |
D | ebitmap.c | 353 u32 mapunit, count, startbit, index; in ebitmap_read() local 366 count = le32_to_cpu(buf[2]); in ebitmap_read() 384 for (i = 0; i < count; i++) { in ebitmap_read() 455 u32 count; in ebitmap_write() local 462 count = 0; in ebitmap_write() 467 count++; in ebitmap_write() 473 buf[2] = cpu_to_le32(count); in ebitmap_write()
|