Home
last modified time | relevance | path

Searched refs:result (Results 1 – 25 of 28) sorted by relevance

12

/security/integrity/ima/
Dima_api.c41 int i, result = 0; in ima_alloc_init_template() local
59 result = field->field_init(event_data, in ima_alloc_init_template()
61 if (result != 0) in ima_alloc_init_template()
72 return result; in ima_alloc_init_template()
98 int result; in ima_store_template() local
109 result = ima_calc_field_array_hash(&entry->template_data[0], in ima_store_template()
112 if (result < 0) { in ima_store_template()
115 audit_cause, result, 0); in ima_store_template()
116 return result; in ima_store_template()
121 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
[all …]
Dima_queue.c141 int result = 0; in ima_pcr_extend() local
145 return result; in ima_pcr_extend()
150 result = tpm_pcr_extend(ima_tpm_chip, pcr, digests); in ima_pcr_extend()
151 if (result != 0) in ima_pcr_extend()
152 pr_err("Error Communicating to TPM chip, result: %d\n", result); in ima_pcr_extend()
153 return result; in ima_pcr_extend()
172 int result = 0, tpmresult = 0; in ima_add_template_entry() local
179 result = -EEXIST; in ima_add_template_entry()
184 result = ima_add_digest_entry(entry, 1); in ima_add_template_entry()
185 if (result < 0) { in ima_add_template_entry()
[all …]
Dima_policy.c266 int i, result; in ima_lsm_copy_rule() local
289 result = security_filter_rule_init(nentry->lsm[i].type, in ima_lsm_copy_rule()
293 if (result == -EINVAL) in ima_lsm_copy_rule()
327 int i, result, needs_update; in ima_lsm_update_rules() local
340 result = ima_lsm_update_rule(entry); in ima_lsm_update_rules()
341 if (result) { in ima_lsm_update_rules()
343 result); in ima_lsm_update_rules()
624 int result; in ima_init_arch_policy() local
626 result = strlcpy(rule, *rules, sizeof(rule)); in ima_init_arch_policy()
629 result = ima_parse_rule(rule, &arch_policy_entry[i]); in ima_init_arch_policy()
[all …]
Dima_init.c50 int result = -ENOMEM; in ima_add_boot_aggregate() local
64 result = ima_calc_boot_aggregate(&hash.hdr); in ima_add_boot_aggregate()
65 if (result < 0) { in ima_add_boot_aggregate()
71 result = ima_alloc_init_template(&event_data, &entry, NULL); in ima_add_boot_aggregate()
72 if (result < 0) { in ima_add_boot_aggregate()
77 result = ima_store_template(entry, violation, NULL, in ima_add_boot_aggregate()
80 if (result < 0) { in ima_add_boot_aggregate()
88 audit_cause, result, 0); in ima_add_boot_aggregate()
89 return result; in ima_add_boot_aggregate()
Dima_fs.c316 ssize_t result; in ima_write_policy() local
322 result = -EINVAL; in ima_write_policy()
328 result = PTR_ERR(data); in ima_write_policy()
332 result = mutex_lock_interruptible(&ima_write_mutex); in ima_write_policy()
333 if (result < 0) in ima_write_policy()
337 result = ima_read_policy(data); in ima_write_policy()
344 result = -EACCES; in ima_write_policy()
346 result = ima_parse_add_rule(data); in ima_write_policy()
352 if (result < 0) in ima_write_policy()
355 return result; in ima_write_policy()
Dima_appraise.c515 int result; in ima_inode_setxattr() local
517 result = ima_protect_xattr(dentry, xattr_name, xattr_value, in ima_inode_setxattr()
519 if (result == 1) { in ima_inode_setxattr()
524 result = 0; in ima_inode_setxattr()
526 return result; in ima_inode_setxattr()
531 int result; in ima_inode_removexattr() local
533 result = ima_protect_xattr(dentry, xattr_name, NULL, 0); in ima_inode_removexattr()
534 if (result == 1) { in ima_inode_removexattr()
536 result = 0; in ima_inode_removexattr()
538 return result; in ima_inode_removexattr()
Dima_template.c260 int result; in ima_init_template() local
262 result = template_desc_init_fields(template->fmt, in ima_init_template()
265 if (result < 0) in ima_init_template()
268 template->name : template->fmt), result); in ima_init_template()
270 return result; in ima_init_template()
Dima_template_lib.c278 int result; in ima_eventdigest_init() local
297 result = ima_calc_file_hash(event_data->file, &hash.hdr); in ima_eventdigest_init()
298 if (result) { in ima_eventdigest_init()
301 "failed", result, 0); in ima_eventdigest_init()
302 return result; in ima_eventdigest_init()
/security/selinux/include/
Davc.h54 int result; member
66 int result, in avc_audit_required() argument
92 } else if (result) in avc_audit_required()
102 u32 requested, u32 audited, u32 denied, int result,
130 int result, in avc_audit() argument
135 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit()
139 requested, audited, denied, result, in avc_audit()
/security/safesetid/
Dlsm.c34 enum sid_policy_type result = SIDPOL_DEFAULT; in _setuid_policy_lookup() local
41 result = SIDPOL_CONSTRAINED; in _setuid_policy_lookup()
43 return result; in _setuid_policy_lookup()
52 enum sid_policy_type result = SIDPOL_DEFAULT; in setuid_policy_lookup() local
58 result = _setuid_policy_lookup(pol, src, dst); in setuid_policy_lookup()
60 return result; in setuid_policy_lookup()
/security/tomoyo/
Dcondition.c34 bool result; in tomoyo_argv() local
40 result = tomoyo_path_matches_pattern(&arg, argv->value); in tomoyo_argv()
42 result = !result; in tomoyo_argv()
43 if (!result) in tomoyo_argv()
73 bool result; in tomoyo_envp() local
79 result = tomoyo_path_matches_pattern(&value, in tomoyo_envp()
82 result = !result; in tomoyo_envp()
84 result = true; in tomoyo_envp()
86 result = !result; in tomoyo_envp()
88 if (!result) in tomoyo_envp()
[all …]
Dutil.c183 u8 tomoyo_parse_ulong(unsigned long *result, char **str) in tomoyo_parse_ulong() argument
200 *result = simple_strtoul(cp, &ep, base); in tomoyo_parse_ulong()
802 bool result; in tomoyo_file_matches_pattern() local
808 result = tomoyo_file_matches_pattern2(filename, in tomoyo_file_matches_pattern()
813 result = !result; in tomoyo_file_matches_pattern()
814 if (result) in tomoyo_file_matches_pattern()
819 result = tomoyo_file_matches_pattern2(filename, filename_end, in tomoyo_file_matches_pattern()
821 return first ? result : !result; in tomoyo_file_matches_pattern()
/security/smack/
Dsmack_access.c318 sad->result ? "denied" : "granted"); in smack_log_callback()
341 int result, struct smk_audit_info *ad) in smack_log() argument
352 if (result < 0 && (log_policy & SMACK_AUDIT_DENIED) == 0) in smack_log()
354 if (result == 0 && (log_policy & SMACK_AUDIT_ACCEPT) == 0) in smack_log()
373 if (result == SMACK_UNCONFINED_SUBJECT) in smack_log()
375 else if (result == SMACK_UNCONFINED_OBJECT) in smack_log()
378 if (result > 0) in smack_log()
379 result = 0; in smack_log()
382 sad->result = result; in smack_log()
388 int result, struct smk_audit_info *ad) in smack_log() argument
Dsmack.h282 int result; member
442 int result, struct smk_audit_info *auditdata);
/security/selinux/ss/
Dstatus.c45 struct page *result = NULL; in selinux_kernel_status_page() local
68 result = state->ss->status_page; in selinux_kernel_status_page()
71 return result; in selinux_kernel_status_page()
Dservices.c212 u32 result; in map_decision() local
214 for (i = 0, result = 0; i < n; i++) { in map_decision()
216 result |= 1<<i; in map_decision()
218 result |= 1<<i; in map_decision()
220 avd->allowed = result; in map_decision()
222 for (i = 0, result = 0; i < n; i++) in map_decision()
224 result |= 1<<i; in map_decision()
225 avd->auditallow = result; in map_decision()
227 for (i = 0, result = 0; i < n; i++) { in map_decision()
229 result |= 1<<i; in map_decision()
[all …]
/security/keys/
Dkeyring.c599 ctx->result = ERR_PTR(-EKEYREVOKED); in keyring_search_iterator()
606 ctx->result = ERR_PTR(-EKEYEXPIRED); in keyring_search_iterator()
622 ctx->result = ERR_PTR(-EACCES); in keyring_search_iterator()
630 ctx->result = ERR_PTR(state); in keyring_search_iterator()
637 ctx->result = make_key_ref(key, ctx->possessed); in keyring_search_iterator()
789 ctx->result = ERR_PTR(-ELOOP); in search_nested_keyrings()
857 key = key_ref_to_ptr(ctx->result); in search_nested_keyrings()
911 ctx->result = ERR_PTR(-EAGAIN); in keyring_search_rcu()
927 __key_get(key_ref_to_ptr(ctx->result)); in keyring_search_rcu()
928 return ctx->result; in keyring_search_rcu()
[all …]
Dtrusted.c186 uint32_t result; in TSS_checkhmac1() local
204 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac1()
221 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac1()
222 sizeof result); in TSS_checkhmac1()
273 uint32_t result; in TSS_checkhmac2() local
292 result = LOAD32N(buffer, TPM_RETURN_OFFSET); in TSS_checkhmac2()
314 ret = crypto_shash_update(&sdesc->shash, (const u8 *)&result, in TSS_checkhmac2()
315 sizeof result); in TSS_checkhmac2()
DKconfig29 bool "Enable temporary caching of the last request_key() result"
32 This option causes the result of the last successful request_key()
Dinternal.h133 key_ref_t result; member
/security/integrity/
Dintegrity_audit.c30 const char *cause, int result, int audit_info) in integrity_audit_msg() argument
56 audit_log_format(ab, " res=%d", !result); in integrity_audit_msg()
Dintegrity.h233 const char *cause, int result, int info);
245 int result, int info) in integrity_audit_msg() argument
/security/selinux/
Davc.c387 int result, in avc_xperms_audit_required() argument
399 } else if (result) { in avc_xperms_audit_required()
417 u8 perm, int result, in avc_xperms_audit() argument
423 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
427 audited, denied, result, ad, 0); in avc_xperms_audit()
733 audit_log_format(ab, " permissive=%u", sad->result ? 0 : 1); in avc_audit_post_callback()
760 u32 requested, u32 audited, u32 denied, int result, in slow_avc_audit() argument
792 sad.result = result; in slow_avc_audit()
/security/apparmor/
Dlabel.c650 int result = label_cmp(label, this); in __label_insert() local
653 if (result == 0) { in __label_insert()
666 } else if (result < 0) in __label_insert()
703 int result = vec_cmp(this->vec, this->size, vec, n); in __vec_find() local
705 if (result > 0) in __vec_find()
707 else if (result < 0) in __vec_find()
1129 int result = label_merge_cmp(a, b, this); in __label_find_merge() local
1131 if (result < 0) in __label_find_merge()
1133 else if (result > 0) in __label_find_merge()
/security/
Dsecurity.c281 static int lsm_append(const char *new, char **result);
414 static int lsm_append(const char *new, char **result) in lsm_append() argument
418 if (*result == NULL) { in lsm_append()
419 *result = kstrdup(new, GFP_KERNEL); in lsm_append()
420 if (*result == NULL) in lsm_append()
424 if (match_last_lsm(*result, new)) in lsm_append()
426 cp = kasprintf(GFP_KERNEL, "%s,%s", *result, new); in lsm_append()
429 kfree(*result); in lsm_append()
430 *result = cp; in lsm_append()

12