Home
last modified time | relevance | path

Searched refs:count (Results 1 – 17 of 17) sorted by relevance

/security/smack/
Dsmackfs.c444 size_t count, loff_t *ppos, in smk_write_rules_list() argument
466 if (count != SMK_OLOADLEN && count != SMK_LOADLEN) in smk_write_rules_list()
470 datalen = count + 1; in smk_write_rules_list()
476 if (copy_from_user(data, buf, count) != 0) { in smk_write_rules_list()
491 data[count] = '\0'; in smk_write_rules_list()
495 data[count] = '\0'; in smk_write_rules_list()
502 if (count == (SMK_OLOADLEN)) in smk_write_rules_list()
518 rc = count; in smk_write_rules_list()
659 size_t count, loff_t *ppos) in smk_write_load() argument
669 return smk_write_rules_list(file, buf, count, ppos, NULL, NULL, in smk_write_load()
[all …]
/security/tomoyo/
Dsecurityfs_if.c40 size_t count, loff_t *ppos) in tomoyo_write_self() argument
44 if (!count || count >= TOMOYO_EXEC_TMPSIZE - 10) in tomoyo_write_self()
46 data = kzalloc(count + 1, GFP_NOFS); in tomoyo_write_self()
49 if (copy_from_user(data, buf, count)) { in tomoyo_write_self()
92 return error ? error : count; in tomoyo_write_self()
106 size_t count, loff_t *ppos) in tomoyo_read_self() argument
111 if (pos >= len || !count) in tomoyo_read_self()
114 if (count < len) in tomoyo_read_self()
115 len = count; in tomoyo_read_self()
179 static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, in tomoyo_read() argument
[all …]
DKconfig16 int "Default maximal count for learning mode"
29 int "Default maximal count for audit log"
Dutil.c1025 unsigned int count = 0; in tomoyo_domain_quota_is_ok() local
1071 count++; in tomoyo_domain_quota_is_ok()
1073 if (count < tomoyo_profile(domain->ns, domain->profile)-> in tomoyo_domain_quota_is_ok()
/security/integrity/evm/
Devm_secfs.c33 size_t count, loff_t *ppos) in evm_read_key() argument
42 rc = simple_read_from_buffer(buf, count, ppos, temp, strlen(temp)); in evm_read_key()
60 size_t count, loff_t *ppos) in evm_write_key() argument
68 if (count >= sizeof(temp) || count == 0) in evm_write_key()
71 if (copy_from_user(temp, buf, count) != 0) in evm_write_key()
74 temp[count] = '\0'; in evm_write_key()
85 return count; in evm_write_key()
Devm_main.c59 int count = 0; in evm_find_protected_xattrs() local
71 count++; in evm_find_protected_xattrs()
74 return count; in evm_find_protected_xattrs()
/security/selinux/
Dselinuxfs.c130 size_t count, loff_t *ppos) in sel_read_enforce() argument
136 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); in sel_read_enforce()
141 size_t count, loff_t *ppos) in sel_write_enforce() argument
149 if (count >= PAGE_SIZE) in sel_write_enforce()
163 if (copy_from_user(page, buf, count)) in sel_write_enforce()
185 length = count; in sel_write_enforce()
201 size_t count, loff_t *ppos) in sel_read_handle_unknown() argument
210 return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); in sel_read_handle_unknown()
231 size_t count, loff_t *ppos) in sel_read_handle_status() argument
237 return simple_read_from_buffer(buf, count, ppos, in sel_read_handle_status()
[all …]
/security/apparmor/
Dprocattr.c119 int count = 0; in aa_setprocattr_changehat() local
138 for (count = 0; (hat < end) && count < 16; ++count) { in aa_setprocattr_changehat()
140 hats[count] = hat; in aa_setprocattr_changehat()
148 return aa_change_hat(hats, count, token, test); in aa_setprocattr_changehat()
Dpolicy.c145 kref_init(&policy->count); in policy_init()
343 free_namespace(container_of(kref, struct aa_namespace, base.count)); in aa_free_namespace_kref()
764 if (atomic_dec_and_test(&p->base.count.refcount)) { in free_profile()
788 base.count); in aa_free_profile_kref()
Dmatch.c186 struct aa_dfa *dfa = container_of(kref, struct aa_dfa, count); in aa_dfa_free_kref()
212 kref_init(&dfa->count); in aa_dfa_unpack()
Ddomain.c616 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest) in aa_change_hat() argument
647 if (count) { in aa_change_hat()
653 for (i = 0; i < count && !hat; i++) in aa_change_hat()
/security/apparmor/include/
Dpolicy.h83 struct kref count; member
98 int count; member
217 kref_get(&c->count); in aa_get_common()
232 kref_get(&(ns->base.count)); in aa_get_namespace()
246 kref_put(&ns->base.count, aa_free_namespace_kref); in aa_put_namespace()
293 kref_get(&(p->base.count)); in aa_get_profile()
305 kref_put(&p->base.count, aa_free_profile_kref); in aa_put_profile()
Dmatch.h92 struct kref count; member
133 kref_put(&dfa->count, aa_dfa_free_kref); in aa_put_dfa()
Ddomain.h32 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest);
/security/
Ddevice_cgroup.c545 int count, rc = 0; in devcgroup_update_access() local
607 for (count = 0; count < sizeof(temp) - 1; count++) { in devcgroup_update_access()
608 temp[count] = *b; in devcgroup_update_access()
629 for (count = 0; count < sizeof(temp) - 1; count++) { in devcgroup_update_access()
630 temp[count] = *b; in devcgroup_update_access()
643 for (b++, count = 0; count < 3; count++, b++) { in devcgroup_update_access()
656 count = 3; in devcgroup_update_access()
/security/integrity/ima/
Dima_fs.c30 static ssize_t ima_show_htable_value(char __user *buf, size_t count, in ima_show_htable_value() argument
37 return simple_read_from_buffer(buf, count, ppos, tmpbuf, len); in ima_show_htable_value()
42 size_t count, loff_t *ppos) in ima_show_htable_violations() argument
44 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations()
54 size_t count, loff_t *ppos) in ima_show_measurements_count() argument
56 return ima_show_htable_value(buf, count, ppos, &ima_htable.len); in ima_show_measurements_count()
/security/selinux/ss/
Debitmap.c353 u32 mapunit, count, startbit, index; in ebitmap_read() local
366 count = le32_to_cpu(buf[2]); in ebitmap_read()
384 for (i = 0; i < count; i++) { in ebitmap_read()
455 u32 count; in ebitmap_write() local
462 count = 0; in ebitmap_write()
467 count++; in ebitmap_write()
473 buf[2] = cpu_to_le32(count); in ebitmap_write()