| /security/apparmor/ |
| A D | path.c | 91 char *res; in d_namespace_path() local 100 *name = res; in d_namespace_path() 101 if (IS_ERR(res)) { in d_namespace_path() 103 return PTR_ERR(res); in d_namespace_path() 122 res = __d_path(path, &root, buf, buflen); in d_namespace_path() 125 res = d_absolute_path(path, buf, buflen); in d_namespace_path() 133 if (IS_ERR_OR_NULL(res)) { in d_namespace_path() 134 if (PTR_ERR(res) == -ENAMETOOLONG) { in d_namespace_path() 141 if (IS_ERR(res)) { in d_namespace_path() 142 error = PTR_ERR(res); in d_namespace_path() [all …]
|
| A D | label.c | 109 int res; in ns_cmp() local 120 if (res) in ns_cmp() 121 return res; in ns_cmp() 137 int res; in profile_cmp() local 149 if (res) in profile_cmp() 150 return res; in profile_cmp() 181 return res; in vec_cmp() 784 bool res; in aa_label_remove() local 792 return res; in aa_label_remove() 806 bool res; in aa_label_replace() local [all …]
|
| A D | policy.c | 883 bool needput, res; in aa_current_policy_view_capable() local 886 res = aa_policy_view_capable(current_cred(), label, ns); in aa_current_policy_view_capable() 889 return res; in aa_current_policy_view_capable() 895 bool needput, res; in aa_current_policy_admin_capable() local 898 res = aa_policy_admin_capable(current_cred(), label, ns); in aa_current_policy_admin_capable() 901 return res; in aa_current_policy_admin_capable()
|
| A D | apparmorfs.c | 2627 int res; in policy_readlink() local 2629 res = snprintf(name, sizeof(name), "%s:[%lu]", AAFS_NAME, in policy_readlink() 2631 if (res > 0 && res < sizeof(name)) in policy_readlink() 2632 res = readlink_copy(buffer, buflen, name, strlen(name)); in policy_readlink() 2634 res = -ENOENT; in policy_readlink() 2636 return res; in policy_readlink()
|
| A D | policy_unpack.c | 401 int res = aa_unpack_str(e, &tmp, name); in aa_unpack_strdup() local 404 if (!res) in aa_unpack_strdup() 407 *string = kmemdup(tmp, res, GFP_KERNEL); in aa_unpack_strdup() 413 return res; in aa_unpack_strdup()
|
| /security/keys/trusted-keys/ |
| A D | trusted_dcp.c | 84 int res = 0; in do_dcp_crypto() local 94 res = PTR_ERR(tfm); in do_dcp_crypto() 101 res = -ENOMEM; in do_dcp_crypto() 108 res = crypto_skcipher_setkey(tfm, paes_key, sizeof(paes_key)); in do_dcp_crypto() 109 if (res < 0) in do_dcp_crypto() 118 res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait); in do_dcp_crypto() 120 res = crypto_wait_req(crypto_skcipher_decrypt(req), &wait); in do_dcp_crypto() 126 return res; in do_dcp_crypto()
|
| A D | trusted_tpm1.c | 749 int res; in getoptions() local 778 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions() 780 if (res < 0) in getoptions() 785 if (res < 0) in getoptions() 793 res = hex2bin(opt->keyauth, args[0].from, in getoptions() 795 if (res < 0) in getoptions() 809 if (res < 0) in getoptions() 833 res = kstrtoul(args[0].from, 10, &lock); in getoptions() 834 if (res < 0) in getoptions() 860 if (res < 0) in getoptions() [all …]
|
| /security/safesetid/ |
| A D | securityfs.c | 102 int res = 0; in verify_ruleset() local 115 res = -EINVAL; in verify_ruleset() 116 return res; in verify_ruleset() 118 res = -EINVAL; in verify_ruleset() 136 return res; in verify_ruleset() 269 ssize_t res = 0; in safesetid_file_read() local 277 res = simple_read_from_buffer(buf, len, ppos, in safesetid_file_read() 282 return res; in safesetid_file_read()
|
| /security/landlock/ |
| A D | syscalls.c | 319 int res, err; in add_rule_path_beneath() local 323 res = copy_from_user(&path_beneath_attr, rule_attr, in add_rule_path_beneath() 325 if (res) in add_rule_path_beneath() 356 int res; in add_rule_net_port() local 360 res = copy_from_user(&net_port_attr, rule_attr, sizeof(net_port_attr)); in add_rule_net_port() 361 if (res) in add_rule_net_port()
|
| /security/keys/ |
| A D | keyctl_pkey.c | 174 struct kernel_pkey_query res; in keyctl_pkey_query() local 181 ret = params.key->type->asym_query(¶ms, &res); in keyctl_pkey_query() 186 if (copy_to_user(_res, &res, sizeof(res)) == 0 && in keyctl_pkey_query()
|
| /security/selinux/ |
| A D | selinuxfs.c | 1729 char res[TMPBUFLEN]; in sel_read_class() local 1730 ssize_t len = scnprintf(res, sizeof(res), "%d", sel_ino_to_class(ino)); in sel_read_class() 1731 return simple_read_from_buffer(buf, count, ppos, res, len); in sel_read_class() 1743 char res[TMPBUFLEN]; in sel_read_perm() local 1744 ssize_t len = scnprintf(res, sizeof(res), "%d", sel_ino_to_perm(ino)); in sel_read_perm() 1745 return simple_read_from_buffer(buf, count, ppos, res, len); in sel_read_perm()
|
| /security/smack/ |
| A D | smackfs.c | 2283 int res; in smk_user_access() local 2292 res = smk_parse_rule(data, &rule, 0); in smk_user_access() 2297 res = smk_parse_long_rule(data, &rule, 0, 3); in smk_user_access() 2300 if (res >= 0) in smk_user_access() 2301 res = smk_access(rule.smk_subject, rule.smk_object, in smk_user_access() 2303 else if (res != -ENOENT) in smk_user_access() 2304 return res; in smk_user_access() 2309 data[0] = res >= 0 ? '1' : '0'; in smk_user_access()
|
| /security/integrity/ima/ |
| A D | ima_policy.c | 1383 unsigned int res = 0; in ima_parse_appraise_algos() local 1403 res |= (1U << idx); in ima_parse_appraise_algos() 1406 return res; in ima_parse_appraise_algos()
|