| /security/integrity/ima/ |
| A D | ima_api.c | 43 int i, result = 0; in ima_alloc_init_template() local 109 int result; in ima_store_template() local 144 int result; in ima_add_violation() local 253 int result = 0; in ima_collect_measurement() local 356 int result = -ENOMEM; in ima_store_measurement() local
|
| A D | ima_queue.c | 147 int result = 0; in ima_pcr_extend() local 175 int result = 0, tpmresult = 0; in ima_add_template_entry() local 225 int result = 0; in ima_restore_measurement_entry() local
|
| A D | ima_init.c | 53 int result = -ENOMEM; in ima_add_boot_aggregate() local
|
| A D | ima_policy.c | 482 int result; in ima_lsm_update_rules() local 575 bool result = false; in ima_match_rules() local 921 int result; in ima_init_arch_policy() local 1135 int result; in ima_lsm_rule_init() local 1416 int result = 0; in ima_parse_rule() local 1929 ssize_t result, len; in ima_parse_add_rule() local
|
| A D | ima_appraise.c | 781 int result; in ima_inode_setxattr() local 818 int result; in ima_inode_removexattr() local
|
| A D | ima_template.c | 296 int result; in ima_init_template() local
|
| A D | ima_fs.c | 336 ssize_t result; in ima_write_policy() local
|
| A D | ima_template_lib.c | 353 int result; in ima_eventdigest_init() local
|
| A D | ima_main.c | 525 int result = 0; in ima_file_mprotect() local
|
| /security/integrity/ |
| A D | integrity_audit.c | 30 const char *cause, int result, int audit_info) in integrity_audit_msg() 38 const char *cause, int result, int audit_info, in integrity_audit_message()
|
| A D | integrity.h | 225 int result, int info) in integrity_audit_msg() 233 int result, int info, int errno) in integrity_audit_message()
|
| /security/selinux/include/ |
| A D | avc.h | 55 int result; member 65 int result, u32 auditdeny, u32 *deniedp) in avc_audit_required() 124 struct av_decision *avd, int result, in avc_audit()
|
| /security/safesetid/ |
| A D | lsm.c | 37 enum sid_policy_type result = SIDPOL_DEFAULT; in _setid_policy_lookup() local 69 enum sid_policy_type result = SIDPOL_DEFAULT; in setid_policy_lookup() local
|
| /security/ipe/ |
| A D | fs.c | 59 const char *result; in getaudit() local 111 const char *result; in getenforce() local
|
| /security/selinux/ |
| A D | status.c | 45 struct page *result = NULL; in selinux_kernel_status_page() local
|
| A D | avc.c | 387 int result, in avc_xperms_audit_required() 416 u8 perm, int result, in avc_xperms_audit() 755 u32 requested, u32 audited, u32 denied, int result, in slow_avc_audit()
|
| /security/tomoyo/ |
| A D | condition.c | 34 bool result; in tomoyo_argv() local 73 bool result; in tomoyo_envp() local 117 bool result = true; in tomoyo_scan_bprm() local 238 bool result; in tomoyo_scan_exec_realpath() local
|
| A D | util.c | 185 u8 tomoyo_parse_ulong(unsigned long *result, char **str) in tomoyo_parse_ulong() 824 bool result; in tomoyo_file_matches_pattern() local
|
| /security/smack/ |
| A D | smack_access.c | 348 int result, struct smk_audit_info *ad) in smack_log() 395 int result, struct smk_audit_info *ad) in smack_log()
|
| A D | smack.h | 264 int result; member
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 179 uint32_t result; in TSS_checkhmac1() local 266 uint32_t result; in TSS_checkhmac2() local
|
| /security/keys/ |
| A D | internal.h | 130 key_ref_t result; member
|
| A D | keyring.c | 1721 int result; in keyring_gc() local
|
| /security/apparmor/ |
| A D | label.c | 687 int result = label_cmp(label, this); in __label_insert() local 741 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find() local 1148 int result = label_merge_cmp(a, b, this); in __label_find_merge() local
|
| /security/selinux/ss/ |
| A D | services.c | 207 u32 result; in map_decision() local
|