/security/apparmor/ |
H A D | crypto.c | 39 int error = -ENOMEM; local 52 error = crypto_shash_init(&desc.shash); 53 if (error) 55 error = crypto_shash_update(&desc.shash, (u8 *) &le32_version, 4); 56 if (error) 58 error = crypto_shash_update(&desc.shash, (u8 *) start, len); 59 if (error) 61 error = crypto_shash_final(&desc.shash, profile->hash); 62 if (error) 71 return error; 83 int error = PTR_ERR(tfm); local [all...] |
H A D | capability.c | 58 * @error: error code returned by test 63 * Returns: 0 or sa->error on success, error code on failure 65 static int audit_caps(struct aa_profile *profile, int cap, int error) argument 75 sa.aad->error = error; 77 if (likely(!error)) { 90 return error; 98 return complain_error(error); 134 int error = profile_capable(profile, cap); local [all...] |
H A D | ipc.c | 36 * @error: error condition 38 * Returns: %0 or error code 41 struct aa_profile *target, int error) 49 aad.error = error; 61 * Returns: %0 else error code if permission denied or error 83 * Returns: %0 else error code if permission denied or error 40 aa_audit_ptrace(struct aa_profile *profile, struct aa_profile *target, int error) argument 98 int error = 0; local [all...] |
H A D | path.c | 52 * Returns: %0 else error code if path lookup fails 53 * When no error the path name is returned in @name which points to 60 int error = 0; local 93 /* handle error conditions - and still allow a partial path to 102 error = PTR_ERR(res); 119 error = -ENOENT; 141 error = -EACCES; 148 return error; 159 * Returns: %0 else error on failure 165 int error local 212 int error; local [all...] |
H A D | domain.c | 58 * Returns: %0 or error if change not allowed 64 int error = 0; local 76 error = aa_may_ptrace(tracerp, to_profile, PTRACE_MODE_ATTACH); 82 return error; 335 * Returns: %0 or error on failure 350 int error = cap_bprm_set_creds(bprm); local 351 if (error) 352 return error; 369 error = aa_path_name(&bprm->file->f_path, profile->path_flags, &buffer, 371 if (error) { 617 int error = 0; local 755 int op, error = 0; local [all...] |
H A D | lsm.c | 99 int error = cap_ptrace_access_check(child, mode); local 100 if (error) 101 return error; 108 int error = cap_ptrace_traceme(parent); local 109 if (error) 110 return error; 144 int error = cap_capable(cred, ns, cap, audit); local 145 if (!error) { 148 error = aa_capable(profile, cap, audit); 150 return error; 166 int error = 0; local 306 int error = 0; local 321 int error = 0; local 380 int error = 0; local 430 int error = 0; local 507 int error = -ENOENT; local 538 int error; local 610 int error = 0; local 754 int error = kstrtoul(str, 0, &enabled); local 899 int error; local [all...] |
H A D | audit.c | 128 if (sa->aad->error) 129 audit_log_format(ab, " error=%d", sa->aad->error); 170 * Returns: error on failure 179 if (likely(!sa->aad->error)) { 191 return sa->aad->error; 206 return complain_error(sa->aad->error); 208 return sa->aad->error;
|
H A D | file.c | 102 * @error: 0 if operation allowed else failure error code 104 * Returns: %0 or error on failure 108 const char *target, kuid_t ouid, const char *info, int error) 121 aad.error = error; 123 if (likely(!sa.aad->error)) { 149 return COMPLAIN_MODE(profile) ? 0 : sa.aad->error; 276 * Returns: %0 else error if access denied or other error 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument 284 int error; local 362 int error; local [all...] |
H A D | resource.c | 46 * @error: error value 48 * Returns: 0 or sa->error else other error code on failure 51 unsigned long value, int error) 61 aad.error = error; 89 * Returns: 0 or error code if setting resource failed 95 int error = 0; local 109 error 50 audit_resource(struct aa_profile *profile, unsigned int resource, unsigned long value, int error) argument [all...] |
H A D | apparmorfs.c | 121 ssize_t error; local 125 error = PTR_ERR(data); 127 error = aa_replace_profiles(data, size, PROF_ADD); 131 return error; 144 ssize_t error; local 147 error = PTR_ERR(data); 149 error = aa_replace_profiles(data, size, PROF_REPLACE); 153 return error; 166 ssize_t error; local 174 error 231 int error = single_open(file, show, r); local 405 int error; local 507 int error; local 837 int error = 0; local 863 int error; local 937 int error; local [all...] |
H A D | policy_unpack.c | 88 * @error: error code 90 * Returns: %0 or error 93 const char *info, struct aa_ext *e, int error) 105 aad.error = error; 301 * Returns: 1 if valid accept tables else 0 if error 479 int i, error = -EPROTO; local 502 error = PTR_ERR(profile->xmatch); 583 error 92 audit_iface(struct aa_profile *new, const char *name, const char *info, struct aa_ext *e, int error) argument 642 int error = -EPROTONOSUPPORT; local 753 int error; local [all...] |
H A D | policy.c | 157 AA_ERROR("%s: internal error, " 163 AA_ERROR("%s: internal error, policy '%s' still on list\n", 537 * Returns: %0 on success else error 876 * Returns: %0 if replacement allowed else error code 899 * @error: error code 901 * Returns: the error to be returned after audit is done 904 int error) 913 aad.error = error; 903 audit_policy(int op, gfp_t gfp, const char *name, const char *info, int error) argument 1046 int error = replacement_allowed(*p, noreplace, info); local 1074 ssize_t error; local 1245 ssize_t error = 0; local [all...] |
/security/tomoyo/ |
H A D | environ.c | 52 int error; local 62 error = tomoyo_audit_env_log(r); 63 } while (error == TOMOYO_RETRY_REQUEST); 64 return error; 96 int error = -ENOMEM; local 103 return error; 104 error = tomoyo_update_domain(&e.head, sizeof(e), param, 107 return error;
|
H A D | securityfs_if.c | 37 * function returns error rather than terminating current thread with SIGKILL. 43 int error; local 50 error = -EFAULT; 66 error = -EPERM; 71 error = -ENOENT; 75 error = -ENOMEM; 83 error = 0; 89 error = -EINVAL; 92 return error ? error [all...] |
H A D | file.c | 385 int error; local 387 error = -EINVAL; 389 error = tomoyo_update_domain(&e.head, sizeof(e), param, 393 return error; 458 int error; local 463 error = -EINVAL; 465 error = tomoyo_update_domain(&e.head, sizeof(e), param, 472 return error; 534 int error; local 537 error 561 int error; local 668 int error; local 697 int error = -ENOMEM; local 739 int error = 0; local 791 int error; local 848 int error = -ENOMEM; local 888 int error = -ENOMEM; local 969 int error; local [all...] |
H A D | mount.c | 89 int error = -ENOMEM; local 103 error = -ENOMEM; 123 error = -ENODEV; 133 error = -ENOENT; 139 error = -ENOENT; 148 error = -ENOMEM; 162 error = tomoyo_audit_mount_log(r); 163 } while (error == TOMOYO_RETRY_REQUEST); 173 return error; 192 int error; local [all...] |
H A D | group.c | 74 int error = -EINVAL; local 82 error = -ENOMEM; 85 error = tomoyo_update_policy(&e.head, sizeof(e), param, 93 error = tomoyo_update_policy(&e.head, sizeof(e), param, 105 error = tomoyo_update_policy(&e.head, sizeof(e), param, 110 return error;
|
H A D | domain.c | 35 int error = param->is_delete ? -ENOENT : -ENOMEM; local 47 error = 0; 50 if (error && !param->is_delete) { 54 error = 0; 58 return error; 99 int error = is_delete ? -ENOENT : -ENOMEM; local 130 error = 0; 133 if (error && !is_delete) { 137 error = 0; 143 return error; 237 int error = param->is_delete ? -ENOENT : -ENOMEM; local 391 int error = param->is_delete ? -ENOENT : -ENOMEM; local 600 int error = -ENOMEM; local [all...] |
H A D | network.c | 284 int error = -EINVAL; local 310 error = tomoyo_update_domain(&e.head, sizeof(e), param, 316 return error; 329 int error; local 344 error = tomoyo_update_domain(&e.head, sizeof(e), param, 348 return error; 470 int error = 0; local 483 error = tomoyo_audit_inet_log(&r); 484 } while (error == TOMOYO_RETRY_REQUEST); 487 return error; 545 int error = 0; local 656 const int error = sock->ops->getname(sock, (struct sockaddr *) local [all...] |
/security/integrity/evm/ |
H A D | evm_secfs.c | 32 * Returns number of bytes read or error code, as appropriate 59 * Returns number of bytes written or error code, as appropriate 65 int i, error; local 81 error = evm_init_key(); 82 if (!error) { 97 int error = 0; local 102 error = -EFAULT; 103 return error;
|
/security/apparmor/include/ |
H A D | audit.h | 106 int error; member in struct:apparmor_audit_data 140 static inline int complain_error(int error) argument 142 if (error == -EPERM || error == -EACCES) 144 return error;
|
/security/keys/ |
H A D | keyctl.c | 57 * If successful, the new key's serial number is returned, otherwise an error 74 goto error; 79 goto error; 86 goto error; 147 error: 179 goto error; 185 goto error; 244 error: 265 goto error; 270 error 1201 keyctl_reject_key(key_serial_t id, unsigned timeout, unsigned error, key_serial_t ringid) argument [all...] |
H A D | process_keys.c | 82 goto error; 121 error: 172 * and other value on any other error 196 * error otherwise. 328 * otherwise we want to return a sample error (probably -EACCES) if 331 * in terms of priority: success > -ENOKEY > -EAGAIN > other error 419 /* no key - decide on the error we're going to go for */ 477 /* no key - decide on the error we're going to go for */ 537 goto error; 542 goto error; [all...] |
/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 39 goto error; 45 error:
|
/security/ |
H A D | inode.c | 76 * you are responsible here). If an error occurs, the function will return 77 * the error value (via ERR_PTR). 89 int error; local 98 error = simple_pin_fs(&fs_type, &mount, &mount_count); 99 if (error) 100 return ERR_PTR(error); 113 error = -EEXIST; 119 error = -ENOMEM; 142 dentry = ERR_PTR(error); 164 * you are responsible here). If an error occur [all...] |