/security/integrity/ima/ |
D | ima_api.c | 41 int i, result = 0; in ima_alloc_init_template() local 59 result = field->field_init(event_data, in ima_alloc_init_template() 61 if (result != 0) in ima_alloc_init_template() 72 return result; in ima_alloc_init_template() 98 int result; in ima_store_template() local 109 result = ima_calc_field_array_hash(&entry->template_data[0], in ima_store_template() 112 if (result < 0) { in ima_store_template() 115 audit_cause, result, 0); in ima_store_template() 116 return result; in ima_store_template() 121 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template() [all …]
|
D | ima_queue.c | 141 int result = 0; in ima_pcr_extend() local 145 return result; in ima_pcr_extend() 150 result = tpm_pcr_extend(ima_tpm_chip, pcr, digests); in ima_pcr_extend() 151 if (result != 0) in ima_pcr_extend() 152 pr_err("Error Communicating to TPM chip, result: %d\n", result); in ima_pcr_extend() 153 return result; in ima_pcr_extend() 172 int result = 0, tpmresult = 0; in ima_add_template_entry() local 179 result = -EEXIST; in ima_add_template_entry() 184 result = ima_add_digest_entry(entry, 1); in ima_add_template_entry() 185 if (result < 0) { in ima_add_template_entry() [all …]
|
D | ima_policy.c | 266 int i, result; in ima_lsm_copy_rule() local 289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule() 293 if (result == -EINVAL) in ima_lsm_copy_rule() 327 int i, result, needs_update; in ima_lsm_update_rules() local 340 result = ima_lsm_update_rule(entry); in ima_lsm_update_rules() 341 if (result) { in ima_lsm_update_rules() 343 result); in ima_lsm_update_rules() 624 int result; in ima_init_arch_policy() local 626 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy() 629 result = ima_parse_rule(rule, &arch_policy_entry[i]); in ima_init_arch_policy() [all …]
|
D | ima_init.c | 50 int result = -ENOMEM; in ima_add_boot_aggregate() local 64 result = ima_calc_boot_aggregate(&hash.hdr); in ima_add_boot_aggregate() 65 if (result < 0) { in ima_add_boot_aggregate() 71 result = ima_alloc_init_template(&event_data, &entry, NULL); in ima_add_boot_aggregate() 72 if (result < 0) { in ima_add_boot_aggregate() 77 result = ima_store_template(entry, violation, NULL, in ima_add_boot_aggregate() 80 if (result < 0) { in ima_add_boot_aggregate() 88 audit_cause, result, 0); in ima_add_boot_aggregate() 89 return result; in ima_add_boot_aggregate()
|
D | ima_fs.c | 316 ssize_t result; in ima_write_policy() local 322 result = -EINVAL; in ima_write_policy() 328 result = PTR_ERR(data); in ima_write_policy() 332 result = mutex_lock_interruptible(&ima_write_mutex); in ima_write_policy() 333 if (result < 0) in ima_write_policy() 337 result = ima_read_policy(data); in ima_write_policy() 344 result = -EACCES; in ima_write_policy() 346 result = ima_parse_add_rule(data); in ima_write_policy() 352 if (result < 0) in ima_write_policy() 355 return result; in ima_write_policy()
|
D | ima_appraise.c | 515 int result; in ima_inode_setxattr() local 517 result = ima_protect_xattr(dentry, xattr_name, xattr_value, in ima_inode_setxattr() 519 if (result == 1) { in ima_inode_setxattr() 524 result = 0; in ima_inode_setxattr() 526 return result; in ima_inode_setxattr() 531 int result; in ima_inode_removexattr() local 533 result = ima_protect_xattr(dentry, xattr_name, NULL, 0); in ima_inode_removexattr() 534 if (result == 1) { in ima_inode_removexattr() 536 result = 0; in ima_inode_removexattr() 538 return result; in ima_inode_removexattr()
|
D | ima_template.c | 260 int result; in ima_init_template() local 262 result = template_desc_init_fields(template->fmt, in ima_init_template() 265 if (result < 0) in ima_init_template() 268 template->name : template->fmt), result); in ima_init_template() 270 return result; in ima_init_template()
|
D | ima_template_lib.c | 278 int result; in ima_eventdigest_init() local 297 result = ima_calc_file_hash(event_data->file, &hash.hdr); in ima_eventdigest_init() 298 if (result) { in ima_eventdigest_init() 301 "failed", result, 0); in ima_eventdigest_init() 302 return result; in ima_eventdigest_init()
|
/security/selinux/include/ |
D | avc.h | 54 int result; member 66 int result, in avc_audit_required() argument 92 } else if (result) in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 130 int result, in avc_audit() argument 135 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 139 requested, audited, denied, result, in avc_audit()
|
/security/safesetid/ |
D | lsm.c | 34 enum sid_policy_type result = SIDPOL_DEFAULT; in _setuid_policy_lookup() local 41 result = SIDPOL_CONSTRAINED; in _setuid_policy_lookup() 43 return result; in _setuid_policy_lookup() 52 enum sid_policy_type result = SIDPOL_DEFAULT; in setuid_policy_lookup() local 58 result = _setuid_policy_lookup(pol, src, dst); in setuid_policy_lookup() 60 return result; in setuid_policy_lookup()
|
/security/tomoyo/ |
D | condition.c | 34 bool result; in tomoyo_argv() local 40 result = tomoyo_path_matches_pattern(&arg, argv->value); in tomoyo_argv() 42 result = !result; in tomoyo_argv() 43 if (!result) in tomoyo_argv() 73 bool result; in tomoyo_envp() local 79 result = tomoyo_path_matches_pattern(&value, in tomoyo_envp() 82 result = !result; in tomoyo_envp() 84 result = true; in tomoyo_envp() 86 result = !result; in tomoyo_envp() 88 if (!result) in tomoyo_envp() [all …]
|
D | util.c | 183 u8 tomoyo_parse_ulong(unsigned long *result, char **str) in tomoyo_parse_ulong() argument 200 *result = simple_strtoul(cp, &ep, base); in tomoyo_parse_ulong() 802 bool result; in tomoyo_file_matches_pattern() local 808 result = tomoyo_file_matches_pattern2(filename, in tomoyo_file_matches_pattern() 813 result = !result; in tomoyo_file_matches_pattern() 814 if (result) in tomoyo_file_matches_pattern() 819 result = tomoyo_file_matches_pattern2(filename, filename_end, in tomoyo_file_matches_pattern() 821 return first ? result : !result; in tomoyo_file_matches_pattern()
|
/security/smack/ |
D | smack_access.c | 318 sad->result ? "denied" : "granted"); in smack_log_callback() 341 int result, struct smk_audit_info *ad) in smack_log() argument 352 if (result < 0 && (log_policy & SMACK_AUDIT_DENIED) == 0) in smack_log() 354 if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0) in smack_log() 373 if (result == SMACK_UNCONFINED_SUBJECT) in smack_log() 375 else if (result == SMACK_UNCONFINED_OBJECT) in smack_log() 378 if (result > 0) in smack_log() 379 result = 0; in smack_log() 382 sad->result = result; in smack_log() 388 int result, struct smk_audit_info *ad) in smack_log() argument
|
D | smack.h | 282 int result; member 442 int result, struct smk_audit_info *auditdata);
|
/security/selinux/ss/ |
D | status.c | 45 struct page *result = NULL; in selinux_kernel_status_page() local 68 result = state->ss->status_page; in selinux_kernel_status_page() 71 return result; in selinux_kernel_status_page()
|
D | services.c | 212 u32 result; in map_decision() local 214 for (i = 0, result = 0; i < n; i++) { in map_decision() 216 result |= 1<<i; in map_decision() 218 result |= 1<<i; in map_decision() 220 avd->allowed = result; in map_decision() 222 for (i = 0, result = 0; i < n; i++) in map_decision() 224 result |= 1<<i; in map_decision() 225 avd->auditallow = result; in map_decision() 227 for (i = 0, result = 0; i < n; i++) { in map_decision() 229 result |= 1<<i; in map_decision() [all …]
|
/security/keys/ |
D | keyring.c | 599 ctx->result = ERR_PTR(-EKEYREVOKED); in keyring_search_iterator() 606 ctx->result = ERR_PTR(-EKEYEXPIRED); in keyring_search_iterator() 622 ctx->result = ERR_PTR(-EACCES); in keyring_search_iterator() 630 ctx->result = ERR_PTR(state); in keyring_search_iterator() 637 ctx->result = make_key_ref(key, ctx->possessed); in keyring_search_iterator() 789 ctx->result = ERR_PTR(-ELOOP); in search_nested_keyrings() 857 key = key_ref_to_ptr(ctx->result); in search_nested_keyrings() 911 ctx->result = ERR_PTR(-EAGAIN); in keyring_search_rcu() 927 __key_get(key_ref_to_ptr(ctx->result)); in keyring_search_rcu() 928 return ctx->result; in keyring_search_rcu() [all …]
|
D | trusted.c | 186 uint32_t result; in TSS_checkhmac1() local 204 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac1() 221 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac1() 222 sizeof result); in TSS_checkhmac1() 273 uint32_t result; in TSS_checkhmac2() local 292 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac2() 314 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac2() 315 sizeof result); in TSS_checkhmac2()
|
D | Kconfig | 29 bool "Enable temporary caching of the last request_key() result" 32 This option causes the result of the last successful request_key()
|
D | internal.h | 133 key_ref_t result; member
|
/security/integrity/ |
D | integrity_audit.c | 30 const char *cause, int result, int audit_info) in integrity_audit_msg() argument 56 audit_log_format(ab, " res=%d", !result); in integrity_audit_msg()
|
D | integrity.h | 233 const char *cause, int result, int info); 245 int result, int info) in integrity_audit_msg() argument
|
/security/selinux/ |
D | avc.c | 387 int result, in avc_xperms_audit_required() argument 399 } else if (result) { in avc_xperms_audit_required() 417 u8 perm, int result, in avc_xperms_audit() argument 423 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 427 audited, denied, result, ad, 0); in avc_xperms_audit() 733 audit_log_format(ab, " permissive=%u", sad->result ? 0 : 1); in avc_audit_post_callback() 760 u32 requested, u32 audited, u32 denied, int result, in slow_avc_audit() argument 792 sad.result = result; in slow_avc_audit()
|
/security/apparmor/ |
D | label.c | 650 int result = label_cmp(label, this); in __label_insert() local 653 if (result == 0) { in __label_insert() 666 } else if (result < 0) in __label_insert() 703 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find() local 705 if (result > 0) in __vec_find() 707 else if (result < 0) in __vec_find() 1129 int result = label_merge_cmp(a, b, this); in __label_find_merge() local 1131 if (result < 0) in __label_find_merge() 1133 else if (result > 0) in __label_find_merge()
|
/security/ |
D | security.c | 281 static int lsm_append(const char *new, char **result); 414 static int lsm_append(const char *new, char **result) in lsm_append() argument 418 if (*result == NULL) { in lsm_append() 419 *result = kstrdup(new, GFP_KERNEL); in lsm_append() 420 if (*result == NULL) in lsm_append() 424 if (match_last_lsm(*result, new)) in lsm_append() 426 cp = kasprintf(GFP_KERNEL, "%s,%s", *result, new); in lsm_append() 429 kfree(*result); in lsm_append() 430 *result = cp; in lsm_append()
|