Searched refs:audit_cause (Results 1 - 5 of 5) sorted by relevance

/linux-master/security/integrity/ima/
H A Dima_init.c45 const char *audit_cause = "ENOMEM"; local
75 audit_cause = "hashing_error";
82 audit_cause = "alloc_entry";
91 audit_cause = "store_entry";
97 audit_cause, result, 0);
H A Dima_queue.c165 const char *audit_cause = "hash_added"; local
173 audit_cause = "hash_exists";
182 audit_cause = "ENOMEM";
194 audit_cause = tpm_audit_cause;
200 op, audit_cause, result, audit_info);
H A Dima_api.c107 static const char audit_cause[] = "hashing_error"; local
117 audit_cause, result, 0);
245 const char *audit_cause = "failed"; local
285 audit_cause = "no-verity-digest";
318 audit_cause = "failed(directio)";
321 filename, "collect_data", audit_cause,
349 static const char audit_cause[] = "ENOMEM"; local
373 op, audit_cause, result, 0);
H A Dima_queue_keys.c72 const char *audit_cause = "ENOMEM"; local
96 audit_cause, rc, 0, rc);
H A Dima_main.c935 const char *audit_cause = "ENOMEM"; local
959 audit_cause = "ima_template_desc_buf";
988 audit_cause = "hashing_error";
998 audit_cause = "hashing_error";
1014 audit_cause = "alloc_entry";
1020 audit_cause = "store_entry";
1028 audit_cause, ret, 0, ret);

Completed in 289 milliseconds