/security/apparmor/ |
D | path.c | 91 char *res; in d_namespace_path() local 99 res = dentry_path(path->dentry, buf, buflen); in d_namespace_path() 100 *name = res; in d_namespace_path() 101 if (IS_ERR(res)) { in d_namespace_path() 103 return PTR_ERR(res); in d_namespace_path() 122 res = __d_path(path, &root, buf, buflen); in d_namespace_path() 125 res = d_absolute_path(path, buf, buflen); in d_namespace_path() 133 if (!res || IS_ERR(res)) { in d_namespace_path() 134 if (PTR_ERR(res) == -ENAMETOOLONG) { in d_namespace_path() 140 res = dentry_path_raw(path->dentry, buf, buflen); in d_namespace_path() [all …]
|
D | label.c | 109 int res; in ns_cmp() local 119 res = a->level - b->level; in ns_cmp() 120 if (res) in ns_cmp() 121 return res; in ns_cmp() 137 int res; in profile_cmp() local 148 res = ns_cmp(a->ns, b->ns); in profile_cmp() 149 if (res) in profile_cmp() 150 return res; in profile_cmp() 177 int res = profile_cmp(a[i], b[i]); in vec_cmp() local 179 if (res != 0) in vec_cmp() [all …]
|
D | policy_unpack.c | 417 int res = unpack_str(e, &tmp, name); in unpack_strdup() local 420 if (!res) in unpack_strdup() 423 *string = kmemdup(tmp, res, GFP_KERNEL); in unpack_strdup() 429 return res; in unpack_strdup()
|
D | apparmorfs.c | 2474 int res; in policy_readlink() local 2476 res = snprintf(name, sizeof(name), "%s:[%lu]", AAFS_NAME, in policy_readlink() 2478 if (res > 0 && res < sizeof(name)) in policy_readlink() 2479 res = readlink_copy(buffer, buflen, name); in policy_readlink() 2481 res = -ENOENT; in policy_readlink() 2483 return res; in policy_readlink()
|
/security/safesetid/ |
D | securityfs.c | 88 int res = 0; in verify_ruleset() local 96 res = -EINVAL; in verify_ruleset() 107 return res; in verify_ruleset() 212 ssize_t res = 0; in safesetid_file_read() local 221 res = simple_read_from_buffer(buf, len, ppos, in safesetid_file_read() 225 return res; in safesetid_file_read()
|
/security/keys/ |
D | trusted.c | 751 int res; in getoptions() local 777 res = hex2bin(opt->pcrinfo, args[0].from, in getoptions() 779 if (res < 0) in getoptions() 783 res = kstrtoul(args[0].from, 16, &handle); in getoptions() 784 if (res < 0) in getoptions() 792 res = hex2bin(opt->keyauth, args[0].from, in getoptions() 794 if (res < 0) in getoptions() 800 res = hex2bin(opt->blobauth, args[0].from, in getoptions() 802 if (res < 0) in getoptions() 812 res = kstrtoul(args[0].from, 10, &lock); in getoptions() [all …]
|
D | keyctl_pkey.c | 174 struct kernel_pkey_query res; in keyctl_pkey_query() local 183 ret = params.key->type->asym_query(¶ms, &res); in keyctl_pkey_query() 188 if (copy_to_user(_res, &res, sizeof(res)) == 0 && in keyctl_pkey_query()
|
/security/selinux/ |
D | selinuxfs.c | 1736 char res[TMPBUFLEN]; in sel_read_class() local 1737 ssize_t len = snprintf(res, sizeof(res), "%d", sel_ino_to_class(ino)); in sel_read_class() 1738 return simple_read_from_buffer(buf, count, ppos, res, len); in sel_read_class() 1750 char res[TMPBUFLEN]; in sel_read_perm() local 1751 ssize_t len = snprintf(res, sizeof(res), "%d", sel_ino_to_perm(ino)); in sel_read_perm() 1752 return simple_read_from_buffer(buf, count, ppos, res, len); in sel_read_perm()
|
/security/smack/ |
D | smackfs.c | 2290 int res; in smk_user_access() local 2299 res = smk_parse_rule(data, &rule, 0); in smk_user_access() 2304 res = smk_parse_long_rule(data, &rule, 0, 3); in smk_user_access() 2307 if (res >= 0) in smk_user_access() 2308 res = smk_access(rule.smk_subject, rule.smk_object, in smk_user_access() 2310 else if (res != -ENOENT) in smk_user_access() 2311 return res; in smk_user_access() 2316 data[0] = res >= 0 ? '1' : '0'; in smk_user_access()
|