Searched refs:status (Results 1 – 6 of 6) sorted by relevance
/security/selinux/ |
D | status.c | 44 struct selinux_kernel_status *status; in selinux_kernel_status_page() local 52 status = page_address(state->status_page); in selinux_kernel_status_page() 54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page() 55 status->sequence = 0; in selinux_kernel_status_page() 56 status->enforcing = enforcing_enabled(state); in selinux_kernel_status_page() 63 status->policyload = 0; in selinux_kernel_status_page() 64 status->deny_unknown = in selinux_kernel_status_page() 82 struct selinux_kernel_status *status; in selinux_status_update_setenforce() local 86 status = page_address(state->status_page); in selinux_status_update_setenforce() 88 status->sequence++; in selinux_status_update_setenforce() [all …]
|
D | Makefile | 9 netnode.o netport.o status.o \
|
D | selinuxfs.c | 228 struct page *status = selinux_kernel_status_page(fsi->state); in sel_open_handle_status() local 230 if (!status) in sel_open_handle_status() 233 filp->private_data = status; in sel_open_handle_status() 241 struct page *status = filp->private_data; in sel_read_handle_status() local 243 BUG_ON(!status); in sel_read_handle_status() 246 page_address(status), in sel_read_handle_status() 253 struct page *status = filp->private_data; in sel_mmap_handle_status() local 256 BUG_ON(!status); in sel_mmap_handle_status() 268 page_to_pfn(status), in sel_mmap_handle_status()
|
/security/integrity/platform_certs/ |
D | load_uefi.c | 52 efi_status_t status; in uefi_check_ignore_db() local 57 status = efi.get_variable(L"MokIgnoreDB", &guid, NULL, &size, &db); in uefi_check_ignore_db() 58 return status == EFI_SUCCESS; in uefi_check_ignore_db() 65 unsigned long *size, efi_status_t *status) in get_cert_list() argument 71 *status = efi.get_variable(name, guid, NULL, &lsize, &tmpdb); in get_cert_list() 72 if (*status == EFI_NOT_FOUND) in get_cert_list() 75 if (*status != EFI_BUFFER_TOO_SMALL) { in get_cert_list() 76 pr_err("Couldn't get size: 0x%lx\n", *status); in get_cert_list() 84 *status = efi.get_variable(name, guid, NULL, &lsize, db); in get_cert_list() 85 if (*status != EFI_SUCCESS) { in get_cert_list() [all …]
|
/security/integrity/ima/ |
D | ima_appraise.c | 128 enum integrity_status status) in ima_set_cache_status() argument 132 iint->ima_mmap_status = status; in ima_set_cache_status() 135 iint->ima_bprm_status = status; in ima_set_cache_status() 138 iint->ima_creds_status = status; in ima_set_cache_status() 142 iint->ima_file_status = status; in ima_set_cache_status() 146 iint->ima_read_status = status; in ima_set_cache_status() 237 enum integrity_status *status, const char **cause) in xattr_verify() argument 247 if (*status != INTEGRITY_PASS_IMMUTABLE) { in xattr_verify() 250 *status = INTEGRITY_FAIL; in xattr_verify() 270 *status = INTEGRITY_FAIL; in xattr_verify() [all …]
|
/security/keys/ |
D | dh.c | 21 long status; in dh_data_from_key() local 35 status = key_validate(key); in dh_data_from_key() 36 if (status == 0) { in dh_data_from_key()
|