Home
last modified time | relevance | path

Searched refs:status (Results 1 – 6 of 6) sorted by relevance

/security/selinux/
Dstatus.c44 struct selinux_kernel_status *status; in selinux_kernel_status_page() local
52 status = page_address(state->status_page); in selinux_kernel_status_page()
54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
55 status->sequence = 0; in selinux_kernel_status_page()
56 status->enforcing = enforcing_enabled(state); in selinux_kernel_status_page()
63 status->policyload = 0; in selinux_kernel_status_page()
64 status->deny_unknown = in selinux_kernel_status_page()
82 struct selinux_kernel_status *status; in selinux_status_update_setenforce() local
86 status = page_address(state->status_page); in selinux_status_update_setenforce()
88 status->sequence++; in selinux_status_update_setenforce()
[all …]
DMakefile9 netnode.o netport.o status.o \
Dselinuxfs.c228 struct page *status = selinux_kernel_status_page(fsi->state); in sel_open_handle_status() local
230 if (!status) in sel_open_handle_status()
233 filp->private_data = status; in sel_open_handle_status()
241 struct page *status = filp->private_data; in sel_read_handle_status() local
243 BUG_ON(!status); in sel_read_handle_status()
246 page_address(status), in sel_read_handle_status()
253 struct page *status = filp->private_data; in sel_mmap_handle_status() local
256 BUG_ON(!status); in sel_mmap_handle_status()
268 page_to_pfn(status), in sel_mmap_handle_status()
/security/integrity/platform_certs/
Dload_uefi.c52 efi_status_t status; in uefi_check_ignore_db() local
57 status = efi.get_variable(L"MokIgnoreDB", &guid, NULL, &size, &db); in uefi_check_ignore_db()
58 return status == EFI_SUCCESS; in uefi_check_ignore_db()
65 unsigned long *size, efi_status_t *status) in get_cert_list() argument
71 *status = efi.get_variable(name, guid, NULL, &lsize, &tmpdb); in get_cert_list()
72 if (*status == EFI_NOT_FOUND) in get_cert_list()
75 if (*status != EFI_BUFFER_TOO_SMALL) { in get_cert_list()
76 pr_err("Couldn't get size: 0x%lx\n", *status); in get_cert_list()
84 *status = efi.get_variable(name, guid, NULL, &lsize, db); in get_cert_list()
85 if (*status != EFI_SUCCESS) { in get_cert_list()
[all …]
/security/integrity/ima/
Dima_appraise.c128 enum integrity_status status) in ima_set_cache_status() argument
132 iint->ima_mmap_status = status; in ima_set_cache_status()
135 iint->ima_bprm_status = status; in ima_set_cache_status()
138 iint->ima_creds_status = status; in ima_set_cache_status()
142 iint->ima_file_status = status; in ima_set_cache_status()
146 iint->ima_read_status = status; in ima_set_cache_status()
237 enum integrity_status *status, const char **cause) in xattr_verify() argument
247 if (*status != INTEGRITY_PASS_IMMUTABLE) { in xattr_verify()
250 *status = INTEGRITY_FAIL; in xattr_verify()
270 *status = INTEGRITY_FAIL; in xattr_verify()
[all …]
/security/keys/
Ddh.c21 long status; in dh_data_from_key() local
35 status = key_validate(key); in dh_data_from_key()
36 if (status == 0) { in dh_data_from_key()