| /security/integrity/ima/ |
| A D | ima_api.c | 43 int i, result = 0; in ima_alloc_init_template() local 72 if (result != 0) in ima_alloc_init_template() 83 return result; in ima_alloc_init_template() 109 int result; in ima_store_template() local 123 return result; in ima_store_template() 144 int result; in ima_add_violation() local 156 if (result < 0) in ima_add_violation() 296 if (result && result != -EBADF && result != -EINVAL) in ima_collect_measurement() 315 if (!result) in ima_collect_measurement() 318 if (result) { in ima_collect_measurement() [all …]
|
| A D | ima_queue.c | 147 int result = 0; in ima_pcr_extend() local 150 return result; in ima_pcr_extend() 153 if (result != 0) in ima_pcr_extend() 155 return result; in ima_pcr_extend() 175 int result = 0, tpmresult = 0; in ima_add_template_entry() local 186 result = -ENODEV; in ima_add_template_entry() 193 result = -EEXIST; in ima_add_template_entry() 200 if (result < 0) { in ima_add_template_entry() 220 return result; in ima_add_template_entry() 225 int result = 0; in ima_restore_measurement_entry() local [all …]
|
| A D | ima_init.c | 53 int result = -ENOMEM; in ima_add_boot_aggregate() local 75 result = ima_calc_boot_aggregate(hash_hdr); in ima_add_boot_aggregate() 76 if (result < 0) { in ima_add_boot_aggregate() 82 result = ima_alloc_init_template(&event_data, &entry, NULL); in ima_add_boot_aggregate() 83 if (result < 0) { in ima_add_boot_aggregate() 88 result = ima_store_template(entry, violation, NULL, in ima_add_boot_aggregate() 91 if (result < 0) { in ima_add_boot_aggregate() 99 audit_cause, result, 0); in ima_add_boot_aggregate() 100 return result; in ima_add_boot_aggregate()
|
| A D | ima_policy.c | 482 int result; in ima_lsm_update_rules() local 489 if (result) { in ima_lsm_update_rules() 682 result = true; in ima_match_rules() 690 return result; in ima_match_rules() 921 int result; in ima_init_arch_policy() local 927 if (result) { in ima_init_arch_policy() 1135 int result; in ima_lsm_rule_init() local 1158 result = 0; in ima_lsm_rule_init() 1161 return result; in ima_lsm_rule_init() 1587 result = 0; in ima_parse_rule() [all …]
|
| A D | ima_appraise.c | 781 int result; in ima_inode_setxattr() local 786 if (result == 1) { in ima_inode_setxattr() 798 if (result == 1 || evm_revalidate_status(xattr_name)) { in ima_inode_setxattr() 800 if (result == 1) in ima_inode_setxattr() 801 result = 0; in ima_inode_setxattr() 803 return result; in ima_inode_setxattr() 818 int result; in ima_inode_removexattr() local 821 if (result == 1 || evm_revalidate_status(xattr_name)) { in ima_inode_removexattr() 823 if (result == 1) in ima_inode_removexattr() 824 result = 0; in ima_inode_removexattr() [all …]
|
| A D | ima_fs.c | 336 ssize_t result; in ima_write_policy() local 342 result = -EINVAL; in ima_write_policy() 348 result = PTR_ERR(data); in ima_write_policy() 352 result = mutex_lock_interruptible(&ima_write_mutex); in ima_write_policy() 353 if (result < 0) in ima_write_policy() 357 result = ima_read_policy(data); in ima_write_policy() 363 result = -EACCES; in ima_write_policy() 365 result = ima_parse_add_rule(data); in ima_write_policy() 371 if (result < 0) in ima_write_policy() 374 return result; in ima_write_policy()
|
| A D | ima_template.c | 296 int result; in ima_init_template() local 298 result = template_desc_init_fields(template->fmt, in ima_init_template() 301 if (result < 0) { in ima_init_template() 304 template->name : template->fmt), result); in ima_init_template() 305 return result; in ima_init_template() 314 result = template_desc_init_fields(template->fmt, in ima_init_template() 317 if (result < 0) in ima_init_template() 320 template->name : template->fmt), result); in ima_init_template() 322 return result; in ima_init_template()
|
| A D | ima_template_lib.c | 353 int result; in ima_eventdigest_init() local 369 result = ima_calc_boot_aggregate(hash_hdr); in ima_eventdigest_init() 372 if (!result && hash.hdr.algo != HASH_ALGO_SHA1) in ima_eventdigest_init() 373 result = -EINVAL; in ima_eventdigest_init() 375 if (result < 0) in ima_eventdigest_init() 390 result = ima_calc_file_hash(event_data->file, hash_hdr); in ima_eventdigest_init() 391 if (result) { in ima_eventdigest_init() 394 "failed", result, 0); in ima_eventdigest_init() 395 return result; in ima_eventdigest_init()
|
| A D | ima_main.c | 525 int result = 0; in ima_file_mprotect() local 549 result = -EPERM; in ima_file_mprotect() 554 "collect_data", "failed-mprotect", result, 0); in ima_file_mprotect() 558 return result; in ima_file_mprotect()
|
| /security/selinux/include/ |
| A D | avc.h | 55 int result; member 65 int result, u32 auditdeny, u32 *deniedp) in avc_audit_required() argument 93 } else if (result) in avc_audit_required() 102 u32 denied, int result, struct common_audit_data *a); 124 struct av_decision *avd, int result, in avc_audit() argument 128 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 132 result, a); in avc_audit()
|
| /security/safesetid/ |
| A D | lsm.c | 37 enum sid_policy_type result = SIDPOL_DEFAULT; in _setid_policy_lookup() local 45 result = SIDPOL_CONSTRAINED; in _setid_policy_lookup() 54 result = SIDPOL_CONSTRAINED; in _setid_policy_lookup() 58 result = SIDPOL_CONSTRAINED; in _setid_policy_lookup() 60 return result; in _setid_policy_lookup() 69 enum sid_policy_type result = SIDPOL_DEFAULT; in setid_policy_lookup() local 78 result = SIDPOL_CONSTRAINED; in setid_policy_lookup() 80 return result; in setid_policy_lookup() 85 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup() 88 return result; in setid_policy_lookup()
|
| /security/tomoyo/ |
| A D | condition.c | 34 bool result; in tomoyo_argv() local 42 result = !result; in tomoyo_argv() 43 if (!result) in tomoyo_argv() 73 bool result; in tomoyo_envp() local 82 result = !result; in tomoyo_envp() 86 result = !result; in tomoyo_envp() 88 if (!result) in tomoyo_envp() 186 if (!result) in tomoyo_scan_bprm() 190 if (result) { in tomoyo_scan_bprm() 222 return result; in tomoyo_scan_bprm() [all …]
|
| A D | util.c | 185 u8 tomoyo_parse_ulong(unsigned long *result, char **str) in tomoyo_parse_ulong() argument 202 *result = simple_strtoul(cp, &ep, base); in tomoyo_parse_ulong() 824 bool result; in tomoyo_file_matches_pattern() local 830 result = tomoyo_file_matches_pattern2(filename, in tomoyo_file_matches_pattern() 835 result = !result; in tomoyo_file_matches_pattern() 836 if (result) in tomoyo_file_matches_pattern() 841 result = tomoyo_file_matches_pattern2(filename, filename_end, in tomoyo_file_matches_pattern() 843 return first ? result : !result; in tomoyo_file_matches_pattern()
|
| /security/integrity/ |
| A D | integrity_audit.c | 30 const char *cause, int result, int audit_info) in integrity_audit_msg() argument 33 result, audit_info, 0); in integrity_audit_msg() 38 const char *cause, int result, int audit_info, in integrity_audit_message() argument 67 audit_log_format(ab, " res=%d errno=%d", !result, errno); in integrity_audit_message()
|
| A D | integrity.h | 208 const char *cause, int result, int info); 212 const char *cause, int result, int info, 225 int result, int info) in integrity_audit_msg() argument 233 int result, int info, int errno) in integrity_audit_message() argument
|
| /security/ipe/ |
| A D | fs.c | 59 const char *result; in getaudit() local 61 result = ((READ_ONCE(success_audit)) ? "1" : "0"); in getaudit() 63 return simple_read_from_buffer(data, len, offset, result, 1); in getaudit() 111 const char *result; in getenforce() local 113 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 115 return simple_read_from_buffer(data, len, offset, result, 1); in getenforce()
|
| /security/smack/ |
| A D | smack_access.c | 325 sad->result ? "denied" : "granted"); in smack_log_callback() 348 int result, struct smk_audit_info *ad) in smack_log() argument 359 if (result < 0 && (log_policy & SMACK_AUDIT_DENIED) == 0) in smack_log() 361 if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0) in smack_log() 380 if (result == SMACK_UNCONFINED_SUBJECT) in smack_log() 382 else if (result == SMACK_UNCONFINED_OBJECT) in smack_log() 385 if (result > 0) in smack_log() 386 result = 0; in smack_log() 389 sad->result = result; in smack_log() 395 int result, struct smk_audit_info *ad) in smack_log() argument
|
| A D | smack.h | 264 int result; member 437 int result, struct smk_audit_info *auditdata);
|
| /security/selinux/ |
| A D | status.c | 45 struct page *result = NULL; in selinux_kernel_status_page() local 68 result = selinux_state.status_page; in selinux_kernel_status_page() 71 return result; in selinux_kernel_status_page()
|
| A D | avc.c | 387 int result, in avc_xperms_audit_required() argument 399 } else if (result) { in avc_xperms_audit_required() 416 u8 perm, int result, in avc_xperms_audit() argument 422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 426 audited, denied, result, ad); in avc_xperms_audit() 721 audit_log_format(ab, " permissive=%u", sad->result ? 0 : 1); in avc_audit_post_callback() 755 u32 requested, u32 audited, u32 denied, int result, in slow_avc_audit() argument 775 sad.result = result; in slow_avc_audit()
|
| /security/keys/ |
| A D | keyring.c | 595 ctx->result = ERR_PTR(-EKEYREVOKED); in keyring_search_iterator() 618 ctx->result = ERR_PTR(-EACCES); in keyring_search_iterator() 626 ctx->result = ERR_PTR(state); in keyring_search_iterator() 788 ctx->result = ERR_PTR(-ELOOP); in search_nested_keyrings() 856 key = key_ref_to_ptr(ctx->result); in search_nested_keyrings() 910 ctx->result = ERR_PTR(-EAGAIN); in keyring_search_rcu() 927 return ctx->result; in keyring_search_rcu() 1205 ctx->result = ERR_PTR(-EDEADLK); in keyring_detect_cycle_iterator() 1233 return PTR_ERR(ctx.result) == -EAGAIN ? 0 : PTR_ERR(ctx.result); in keyring_detect_cycle() 1721 int result; in keyring_gc() local [all …]
|
| A D | Kconfig | 25 bool "Enable temporary caching of the last request_key() result" 28 This option causes the result of the last successful request_key()
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 179 uint32_t result; in TSS_checkhmac1() local 197 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac1() 214 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac1() 215 sizeof result); in TSS_checkhmac1() 266 uint32_t result; in TSS_checkhmac2() local 285 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac2() 307 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac2() 308 sizeof result); in TSS_checkhmac2()
|
| /security/apparmor/ |
| A D | label.c | 687 int result = label_cmp(label, this); in __label_insert() local 690 if (result == 0) { in __label_insert() 703 } else if (result < 0) in __label_insert() 741 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find() local 743 if (result > 0) in __vec_find() 745 else if (result < 0) in __vec_find() 1148 int result = label_merge_cmp(a, b, this); in __label_find_merge() local 1150 if (result < 0) in __label_find_merge() 1152 else if (result > 0) in __label_find_merge()
|
| /security/selinux/ss/ |
| A D | services.c | 207 u32 result; in map_decision() local 211 result |= (u32)1<<i; in map_decision() 213 result |= (u32)1<<i; in map_decision() 215 avd->allowed = result; in map_decision() 217 for (i = 0, result = 0; i < n; i++) in map_decision() 219 result |= (u32)1<<i; in map_decision() 220 avd->auditallow = result; in map_decision() 224 result |= (u32)1<<i; in map_decision() 226 result |= (u32)1<<i; in map_decision() 234 result |= (u32)1<<i; in map_decision() [all …]
|