/security/selinux/ |
H A D | netlabel.c | 60 int rc; local 62 rc = security_netlbl_secattr_to_sid(secattr, sid); 63 if (rc == 0 && 68 return rc; 83 int rc; local 93 rc = security_netlbl_sid_to_secattr(sksec->sid, secattr); 94 if (rc != 0) { 206 int rc; local 215 rc = netlbl_skbuff_getattr(skb, family, &secattr); 216 if (rc 241 int rc; local 284 int rc; local 332 int rc; local 374 int rc; local 429 int rc = 0; local 466 int rc; local [all...] |
H A D | hooks.c | 374 int rc; local 376 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, 378 if (rc) 379 return rc; 381 rc = avc_has_perm(tsec->sid, sid, SECCLASS_FILESYSTEM, 383 return rc; 391 int rc; local 392 rc = avc_has_perm(tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, 394 if (rc) 395 return rc; 421 int rc = 0; local 499 int rc = 0, i; local 615 int rc = 0, i; local 927 int rc, num_mnt_opts = 0; local 1046 int rc = 0; local 1118 int rc; local 1240 int rc; local 1277 int rc = 0; local 1554 int rc; local 1672 int rc; local 1705 int rc; local 1761 int rc; local 1805 int rc; local 1943 int rc; local 1968 int rc; local 1992 int rc; local 2009 int rc; local 2058 int rc; local 2070 int rc = 0; local 2104 int rc; local 2139 int rc, cap_sys_admin = 0; local 2157 int rc; local 2193 int rc; local 2386 int rc, i; local 2432 int rc, i; local 2531 int fnosec, fsec, rc = 0; local 2573 int rc, i, *flags; local 2661 int rc; local 2731 int rc; local 2764 int rc; local 2877 int rc; local 2898 int rc, rc2; local 2996 int rc = 0; local 3071 int rc; local 3165 int rc; local 3254 int rc; local 3331 int rc = 0; local 3365 int rc; local 3402 int rc = 0; local 3686 int rc; local 3697 int rc; local 3728 int rc; local 3751 int rc; local 4077 int rc; local 5247 int rc; local 5321 int rc; local 5366 int rc; local 5388 int rc; local 5480 int rc; local 5891 int rc; local [all...] |
H A D | xfrm.c | 84 int rc; local 107 rc = security_context_to_sid(ctx->ctx_str, str_len, &ctx->ctx_sid, gfp); 108 if (rc) 111 rc = avc_has_perm(tsec->sid, ctx->ctx_sid, 113 if (rc) 122 return rc; 158 int rc; local 169 rc = avc_has_perm(fl_secid, ctx->ctx_sid, 171 return (rc == -EACCES ? -ESRCH : rc); 273 int rc; local 347 int rc; local [all...] |
H A D | avc.c | 147 int rc; local 151 rc = security_sid_to_context(ssid, &scontext, &scontext_len); 152 if (rc) 159 rc = security_sid_to_context(tsid, &scontext, &scontext_len); 160 if (rc) 255 unsigned int rc = 0; local 260 rc = security_operation_test(od->allowed->perms, num); 263 rc = security_operation_test(od->auditallow->perms, num); 266 rc = security_operation_test(od->dontaudit->perms, num); 267 return rc; 685 int rc = 0; local 800 int rc = 0; local 839 int hvalue, rc = 0; local 957 int rc = 0, tmprc; local 1035 int rc = 0, rc2; local 1120 int rc = 0; local 1161 int rc, rc2; local [all...] |
/security/integrity/ima/ |
H A D | ima_init.c | 97 int rc; local 100 rc = tpm_pcr_read(TPM_ANY_NUM, 0, pcr_i); 101 if (rc == 0) 107 rc = ima_init_keyring(INTEGRITY_KEYRING_IMA); 108 if (rc) 109 return rc; 111 rc = ima_init_crypto(); 112 if (rc) 113 return rc; 114 rc [all...] |
H A D | ima_crypto.c | 102 long rc; local 106 rc = PTR_ERR(ima_shash_tfm); 108 hash_algo_name[ima_hash_algo], rc); 109 return rc; 117 int rc; local 125 rc = PTR_ERR(tfm); 127 hash_algo_name[algo], rc); 204 int rc; local 215 rc = PTR_ERR(tfm); 217 hash_algo_name[algo], rc); 263 int rc, read = 0, rbuf_len, active = 0, ahash_rc = 0; local 369 int rc; local 388 int rc, read = 0; local 442 int rc; local 471 int rc; local 494 int rc, i; local 537 int rc; local 567 int rc, i; local 591 int rc; local [all...] |
H A D | ima_appraise.c | 51 int rc, offset; local 62 rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_IMA, 66 return rc; 195 int rc = xattr_len, hash_start = 0; local 200 if (rc <= 0) { 201 if (rc && rc != -ENODATA) 213 status = evm_verifyxattr(dentry, XATTR_NAME_IMA, xattr_value, rc, iint); 237 rc = memcmp(&xattr_value->digest[hash_start], 241 rc 293 int rc = 0; local 319 int must_appraise, rc; local [all...] |
H A D | ima_main.c | 164 int rc = -ENOMEM, action, must_appraise; local 200 rc = 0; 216 rc = ima_get_cache_status(iint, function); 225 rc = ima_collect_measurement(iint, file, xattr_ptr, &xattr_len); 226 if (rc != 0) { 228 rc = (iint->flags & IMA_PERMIT_DIRECTIO) ? 0 : -EACCES; 239 rc = ima_appraise_measurement(function, iint, file, pathname, 246 rc = -EACCES; 252 if ((rc && must_appraise) && (ima_appraise & IMA_APPRAISE_ENFORCE))
|
H A D | ima_queue.c | 51 int rc; local 56 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); 57 if (rc == 0) {
|
/security/selinux/ss/ |
H A D | policydb.c | 178 int rc; local 181 rc = -ENOMEM; 186 rc = -EINVAL; 191 rc = -ENOMEM; 196 rc = hashtab_insert(p->p_roles.table, key, role); 197 if (rc) 204 return rc; 274 int i, rc; local 279 rc = symtab_init(&p->symtab[i], symtab_sizes[i]); 280 if (rc) 521 int i, rc; local 890 int rc; local 993 int rc; local 1053 int rc; local 1090 int rc; local 1112 int rc; local 1148 int i, rc; local 1196 int rc; local 1220 int rc, i, j, depth; local 1314 int i, rc; local 1406 int rc, to_read = 2; local 1463 int rc, to_read = 3; local 1515 int rc; local 1538 int rc, to_read = 2; local 1589 int rc; local 1631 int rc; local 1780 int rc; local 1841 int i, rc; local 1916 int rc, i; local 1994 int i, j, rc; local 2107 int i, j, rc; local 2234 int i, j, rc; local 2522 int rc; local 2544 int rc, eq; local 2583 int rc; local 2611 int rc; local 2634 int rc; local 2666 int rc; local 2692 int rc; local 2722 int rc; local 2746 int rc; local 2770 int rc; local 2793 int rc; local 2844 int rc; local 2930 int rc; local 2968 int rc; local 3010 int rc; local 3058 unsigned int i, j, rc; local 3158 int rc; local 3220 int rc; local 3243 int rc, nel; local 3274 int rc; local 3303 int rc; local 3333 int rc; local [all...] |
H A D | conditional.c | 121 int rc; local 126 rc = avtab_init(&p->te_cond_avtab); 127 if (rc) 128 return rc; 227 int rc; local 233 rc = next_entry(buf, fp, sizeof buf); 234 if (rc) 240 rc = -EINVAL; 246 rc = -ENOMEM; 250 rc 278 int rc = -EINVAL; local 354 int i, rc; local 403 int rc; local 458 int rc; local 501 int rc; local 531 int rc; local 559 int rc; local 598 int rc; local [all...] |
H A D | context.h | 42 int rc; local 45 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); 46 if (rc) 50 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); 51 if (rc) 54 return rc; 62 int rc; local 65 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); 66 if (rc) 70 rc 82 int rc; local 119 int rc; local [all...] |
H A D | services.c | 788 int rc = 0; local 800 rc = -EINVAL; 809 rc = -EINVAL; 817 rc = -EINVAL; 825 rc = -EINVAL; 833 rc = security_validtrans_handle_fail(ocontext, ncontext, 842 return rc; 859 int rc; local 863 rc = -EINVAL; 871 rc 1238 int rc = 0; local 1318 int rc = 0; local 1395 int rc = 0; local 1570 int rc = 0; local 1851 int rc = 0; local 2008 int rc = 0; local 2167 int rc = 0; local 2205 int rc = 0; local 2264 int rc; local 2353 int rc = 0, i, j; local 2463 int rc, cmp = 0; local 2533 int rc = 0; local 2574 int i, rc; local 2625 int i, rc; local 2674 int rc; local 2692 int rc, nbools = 0, *bvalues = NULL, i; local 2732 int rc; local 2814 int rc; local 2887 int rc; local 2926 int rc, i; local 2991 int rc; local 3022 int rc = 0; local 3317 int rc; local 3387 int rc; local 3424 int rc; local [all...] |
H A D | avtab.c | 364 int i, rc; local 371 rc = next_entry(buf32, fp, sizeof(u32)); 372 if (rc) { 374 return rc; 382 rc = next_entry(buf32, fp, sizeof(u32)*items2); 383 if (rc) { 385 return rc; 429 rc = insertf(a, &key, &datum, p); 430 if (rc) 431 return rc; 510 int rc; local 556 int rc; local 587 int rc = 0; local [all...] |
H A D | ebitmap.c | 95 int rc; local 111 rc = netlbl_catmap_setlong(catmap, 115 if (rc != 0) 143 int rc; local 150 rc = netlbl_catmap_getlong(catmap, &offset, &bitmap); 151 if (rc < 0) 343 int rc, i; local 347 rc = next_entry(buf, fp, sizeof buf); 348 if (rc < 0) 372 rc 445 int bit, last_bit, last_startbit, rc; local [all...] |
H A D | mls.c | 246 int l, rc = -EINVAL; local 268 rc = mls_context_cpy(context, defcon); 284 rc = -EINVAL; 310 rc = -EINVAL; 314 rc = ebitmap_set_bit(&context->range.level[l].cat, 316 if (rc) 325 rc = -EINVAL; 330 rc = -EINVAL; 335 rc = ebitmap_set_bit(&context->range.level[l].cat, i, 1); 336 if (rc) 380 int rc; local 405 int l, rc = 0; local 486 int rc; local 622 int rc; local 650 int rc; local [all...] |
H A D | sidtab.c | 35 int hvalue, rc = 0; local 39 rc = -ENOMEM; 52 rc = -EEXIST; 58 rc = -ENOMEM; 64 rc = -ENOMEM; 82 return rc; 131 int i, rc = 0; local 140 rc = apply(cur->sid, &cur->context, args); 141 if (rc) 147 return rc; [all...] |
/security/yama/ |
H A D | yama_lsm.c | 157 int rc; local 160 rc = cap_task_prctl(option, arg2, arg3, arg4, arg5); 161 if (rc != -ENOSYS) 162 return rc; 180 rc = 0; 182 rc = yama_ptracer_add(NULL, myself); 191 rc = -EINVAL; 195 rc = yama_ptracer_add(tracer, myself); 204 return rc; 217 int rc local 250 int rc = 0; local 285 int rc; local 338 int rc; local 382 int rc; local [all...] |
/security/smack/ |
H A D | smack_lsm.c | 82 struct smack_known *oskp, int mode, int rc) 86 if (rc <= 0) 87 return rc; 100 int mode, int rc) 105 if (rc <= 0) 106 return rc; 119 static int smk_bu_task(struct task_struct *otp, int mode, int rc) argument 125 if (rc <= 0) 126 return rc; 139 static int smk_bu_inode(struct inode *inode, int mode, int rc) argument 81 smk_bu_note(char *note, struct smack_known *sskp, struct smack_known *oskp, int mode, int rc) argument 99 smk_bu_current(char *note, struct smack_known *oskp, int mode, int rc) argument 158 smk_bu_file(struct file *file, int mode, int rc) argument 180 smk_bu_credfile(const struct cred *cred, struct file *file, int mode, int rc) argument 213 int rc; local 289 int rc = 0; local 336 int rc; local 391 int rc; local 414 int rc; local 435 int rc = 0; local 648 int rc; local 674 int rc; local 840 int rc; local 871 int rc; local 904 int rc; local 944 int rc; local 977 int rc; local 1006 int rc; local 1032 int rc; local 1064 int rc = 0; local 1163 int rc; local 1186 int rc = 0; local 1246 int rc = 0; local 1381 int rc = 0; local 1410 int rc; local 1435 int rc = 0; local 1485 int rc; local 1597 int rc; local 1626 int rc; local 1662 int rc; local 1743 int rc; local 1829 int rc; local 1895 int rc; local 1912 int rc; local 1941 int rc; local 1989 int rc; local 2141 int rc = 0; local 2182 int rc; local 2305 int rc; local 2383 int rc = 0; local 2484 int rc = 0; local 2600 int rc; local 2727 int rc; local 2860 int rc; local 2964 int rc; local 3004 int rc; local 3292 int rc = 0; local 3337 int rc; local 3369 int rc = 0; local 3533 int rc = 0; local 3598 int rc = 0; local 3635 int rc; local 3711 int rc; local 3852 int rc; local [all...] |
H A D | smackfs.c | 222 int rc = 0; local 243 rc = -ENOMEM; 262 rc = -ENOMEM; 268 return rc; 388 int rc; local 390 rc = smk_fill_rule(data, data + SMK_LABELLEN, 393 return rc; 410 int rc; local 435 rc = smk_fill_rule(tok[0], tok[1], tok[2], tok[3], rule, import, 0); 436 return rc 468 int rc; local 714 int rc; local 757 int rc; local 869 ssize_t rc = -EINVAL; local 1167 int rc; local 1334 ssize_t rc; local 1400 ssize_t rc; local 1478 ssize_t rc; local 1555 ssize_t rc; local 1595 int rc = count; local 1647 ssize_t rc = -EINVAL; local 1678 int rc = count; local 1733 ssize_t rc; local 2100 int rc = count; local 2206 ssize_t rc = -EINVAL; local 2240 int rc = count; local 2283 ssize_t rc; local 2344 int rc; local 2453 int rc; local [all...] |
H A D | smack_access.c | 129 int rc = 0; local 137 rc = -EACCES; 182 rc = -EACCES; 192 rc = MAY_BRINGUP; 199 request, rc, a); 202 return rc; 222 int rc; local 227 rc = smk_access(sbj_known, obj_known, mode, NULL); 228 if (rc >= 0) { 240 rc 476 int rc; local 511 int rc; local [all...] |
/security/integrity/evm/ |
H A D | evm_crypto.c | 37 long rc; local 56 rc = PTR_ERR(*tfm); 57 pr_err("Can not allocate %s (reason: %ld)\n", algo, rc); 60 return ERR_PTR(rc); 63 rc = crypto_shash_setkey(*tfm, evmkey, evmkey_len); 64 if (rc) { 68 return ERR_PTR(rc); 83 rc = crypto_shash_init(desc); 84 if (rc) { 86 return ERR_PTR(rc); 204 int rc = 0; local 243 int rc = 0; local [all...] |
H A D | evm_main.c | 118 int rc, xattr_len; local 126 rc = vfs_getxattr_alloc(dentry, XATTR_NAME_EVM, (char **)&xattr_data, 0, 128 if (rc <= 0) { 130 if (rc == -ENODATA) { 131 rc = evm_find_protected_xattrs(dentry); 132 if (rc > 0) 134 else if (rc == 0) 136 } else if (rc == -EOPNOTSUPP) { 142 xattr_len = rc; 147 rc 436 int rc; local [all...] |
H A D | evm_secfs.c | 38 ssize_t rc; local 44 rc = simple_read_from_buffer(buf, count, ppos, temp, strlen(temp)); 46 return rc;
|
/security/ |
H A D | device_cgroup.c | 545 int rc = 0; local 569 rc = dev_exception_add(devcg, ex); 570 if (rc) 587 return rc; 608 int count, rc = 0; local 632 rc = dev_exceptions_copy(&devcgroup->exceptions, 634 if (rc) 635 return rc; 672 rc = kstrtou32(temp, 10, &ex.major); 673 if (rc) 816 bool rc; local [all...] |