/security/apparmor/ |
H A D | crypto.c | 39 int error = -ENOMEM; local 52 error = crypto_shash_init(&desc.shash); 53 if (error) 55 error = crypto_shash_update(&desc.shash, (u8 *) &le32_version, 4); 56 if (error) 58 error = crypto_shash_update(&desc.shash, (u8 *) start, len); 59 if (error) 61 error = crypto_shash_final(&desc.shash, profile->hash); 62 if (error) 71 return error; 83 int error = PTR_ERR(tfm); local [all...] |
H A D | ipc.c | 36 * @error: error condition 38 * Returns: %0 or error code 41 struct aa_profile *target, int error) 49 aad.error = error; 61 * Returns: %0 else error code if permission denied or error 83 * Returns: %0 else error code if permission denied or error 40 aa_audit_ptrace(struct aa_profile *profile, struct aa_profile *target, int error) argument 98 int error = 0; local [all...] |
H A D | capability.c | 58 * @error: error code returned by test 63 * Returns: 0 or sa->error on success, error code on failure 65 static int audit_caps(struct aa_profile *profile, int cap, int error) argument 75 sa.aad->error = error; 77 if (likely(!error)) { 90 return error; 98 return complain_error(error); 134 int error = profile_capable(profile, cap); local [all...] |
H A D | path.c | 52 * Returns: %0 else error code if path lookup fails 53 * When no error the path name is returned in @name which points to 60 int error = 0; local 93 /* handle error conditions - and still allow a partial path to 102 error = PTR_ERR(res); 119 error = -ENOENT; 141 error = -EACCES; 148 return error; 159 * Returns: %0 else error on failure 165 int error local 212 int error; local [all...] |
H A D | resource.c | 46 * @error: error value 48 * Returns: 0 or sa->error else other error code on failure 51 unsigned long value, int error) 61 aad.error = error; 89 * Returns: 0 or error code if setting resource failed 95 int error = 0; local 109 error 50 audit_resource(struct aa_profile *profile, unsigned int resource, unsigned long value, int error) argument [all...] |
H A D | match.c | 98 * Returns: %0 else error code on failure to verify 103 int error = -EPROTO; local 144 "bounds error\n"); 157 error = 0; 159 return error; 206 int error = -ENOMEM; local 215 error = -EPROTO; 272 error = verify_dfa(dfa, flags); 273 if (error) 281 return ERR_PTR(error); [all...] |
H A D | file.c | 102 * @error: 0 if operation allowed else failure error code 104 * Returns: %0 or error on failure 108 const char *target, kuid_t ouid, const char *info, int error) 121 aad.error = error; 123 if (likely(!sa.aad->error)) { 149 return COMPLAIN_MODE(profile) ? 0 : sa.aad->error; 276 * Returns: %0 else error if access denied or other error 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument 284 int error; local 362 int error; local [all...] |
H A D | domain.c | 58 * Returns: %0 or error if change not allowed 64 int error = 0; local 76 error = aa_may_ptrace(tracerp, to_profile, PTRACE_MODE_ATTACH); 82 return error; 335 * Returns: %0 or error on failure 350 int error = cap_bprm_set_creds(bprm); local 351 if (error) 352 return error; 369 error = aa_path_name(&bprm->file->f_path, profile->path_flags, &buffer, 371 if (error) { 617 int error = 0; local 755 int op, error = 0; local [all...] |
/security/integrity/evm/ |
H A D | evm_secfs.c | 32 * Returns number of bytes read or error code, as appropriate 59 * Returns number of bytes written or error code, as appropriate 65 int i, error; local 81 error = evm_init_key(); 82 if (!error) { 97 int error = 0; local 102 error = -EFAULT; 103 return error;
|
H A D | evm_crypto.c | 139 int error; local 148 error = -ENODATA; 152 error = 0; 160 error = -ENOMEM; 166 error = 0; 175 return error;
|
H A D | evm_main.c | 77 int error; local 84 error = inode->i_op->getxattr(dentry, *xattr, NULL, 0); 85 if (error < 0) { 86 if (error == -ENODATA) 88 return error; 462 int error; local 466 error = evm_init_secfs(); 467 if (error < 0) { 474 return error;
|
/security/tomoyo/ |
H A D | environ.c | 52 int error; local 62 error = tomoyo_audit_env_log(r); 63 } while (error == TOMOYO_RETRY_REQUEST); 64 return error; 96 int error = -ENOMEM; local 103 return error; 104 error = tomoyo_update_domain(&e.head, sizeof(e), param, 107 return error;
|
H A D | group.c | 74 int error = -EINVAL; local 82 error = -ENOMEM; 85 error = tomoyo_update_policy(&e.head, sizeof(e), param, 93 error = tomoyo_update_policy(&e.head, sizeof(e), param, 105 error = tomoyo_update_policy(&e.head, sizeof(e), param, 110 return error;
|
H A D | mount.c | 89 int error = -ENOMEM; local 103 error = -ENOMEM; 123 error = -ENODEV; 133 error = -ENOENT; 139 error = -ENOENT; 148 error = -ENOMEM; 162 error = tomoyo_audit_mount_log(r); 163 } while (error == TOMOYO_RETRY_REQUEST); 173 return error; 192 int error; local [all...] |
H A D | securityfs_if.c | 37 * function returns error rather than terminating current thread with SIGKILL. 43 int error; local 50 error = -EFAULT; 66 error = -EPERM; 71 error = -ENOENT; 75 error = -ENOMEM; 83 error = 0; 89 error = -EINVAL; 92 return error ? error [all...] |
H A D | domain.c | 35 int error = param->is_delete ? -ENOENT : -ENOMEM; local 47 error = 0; 50 if (error && !param->is_delete) { 54 error = 0; 58 return error; 99 int error = is_delete ? -ENOENT : -ENOMEM; local 130 error = 0; 133 if (error && !is_delete) { 137 error = 0; 143 return error; 237 int error = param->is_delete ? -ENOENT : -ENOMEM; local 391 int error = param->is_delete ? -ENOENT : -ENOMEM; local 600 int error = -ENOMEM; local [all...] |
H A D | file.c | 385 int error; local 387 error = -EINVAL; 389 error = tomoyo_update_domain(&e.head, sizeof(e), param, 393 return error; 458 int error; local 463 error = -EINVAL; 465 error = tomoyo_update_domain(&e.head, sizeof(e), param, 472 return error; 534 int error; local 537 error 561 int error; local 668 int error; local 697 int error = -ENOMEM; local 739 int error = 0; local 791 int error; local 848 int error = -ENOMEM; local 888 int error = -ENOMEM; local 969 int error; local [all...] |
H A D | network.c | 284 int error = -EINVAL; local 310 error = tomoyo_update_domain(&e.head, sizeof(e), param, 316 return error; 329 int error; local 344 error = tomoyo_update_domain(&e.head, sizeof(e), param, 348 return error; 470 int error = 0; local 483 error = tomoyo_audit_inet_log(&r); 484 } while (error == TOMOYO_RETRY_REQUEST); 487 return error; 545 int error = 0; local 656 const int error = sock->ops->getname(sock, (struct sockaddr *) local [all...] |
/security/ |
H A D | inode.c | 76 * you are responsible here). If an error occurs, the function will return 77 * the error value (via ERR_PTR). 89 int error; local 98 error = simple_pin_fs(&fs_type, &mount, &mount_count); 99 if (error) 100 return ERR_PTR(error); 113 error = -EEXIST; 119 error = -ENOMEM; 142 dentry = ERR_PTR(error); 164 * you are responsible here). If an error occur [all...] |
/security/selinux/include/ |
H A D | netlabel.h | 43 void selinux_netlbl_err(struct sk_buff *skb, int error, int gateway); 75 int error, 74 selinux_netlbl_err(struct sk_buff *skb, int error, int gateway) argument
|
/security/selinux/ |
H A D | netlabel.c | 142 * selinux_netlbl_err - Handle a NetLabel packet error 144 * @error: the error code 148 * When a packet is dropped due to a call to avc_has_perm() pass the error 154 void selinux_netlbl_err(struct sk_buff *skb, int error, int gateway) argument 156 netlbl_skbuff_err(skb, error, gateway); 366 * error. 422 * allowed, -EACCES when denied, and other negative values on error.
|
/security/integrity/ima/ |
H A D | ima_main.c | 75 * results in a time of measure, time of use (ToMToU) error. 77 * could result in a file measurement error. 265 * On success return 0. On integrity appraisal error, assuming the file 285 * On success return 0. On integrity appraisal error, assuming the file 300 * On success return 0. On integrity appraisal error, assuming the file 317 * On success return 0. On integrity appraisal error, assuming the file 346 int error; local 349 error = ima_init(); 350 if (!error) { 354 return error; [all...] |
/security/keys/ |
H A D | request_key.c | 27 * @error: The success or failute of the construction. 30 * if an error is indicated. The authorisation key will be revoked 33 void complete_request_key(struct key_construction *cons, int error) argument 35 kenter("{%d,%d},%d", cons->key->serial, cons->authkey->serial, error); 37 if (error < 0) 237 * returning an error */ 534 goto error; 569 error:
|
H A D | key.c | 217 * Returns a pointer to the new key if successful and an error code otherwise. 235 goto error; 241 goto error; 315 error: 329 goto error; 343 goto error; 349 goto error; 390 /* change the recorded data length if that didn't generate an error */ 491 goto error; 497 goto error; 534 key_reject_and_link(struct key *key, unsigned timeout, unsigned error, struct key *keyring, struct key *authkey) argument [all...] |
/security/apparmor/include/ |
H A D | audit.h | 106 int error; member in struct:apparmor_audit_data 140 static inline int complain_error(int error) argument 142 if (error == -EPERM || error == -EACCES) 144 return error;
|