/security/selinux/ |
D | nlmsgtab.c | 136 int i, err = -EINVAL; in nlmsg_perm() local 141 err = 0; in nlmsg_perm() 145 return err; in nlmsg_perm() 150 int err = 0; in selinux_nlmsg_lookup() local 154 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, in selinux_nlmsg_lookup() 160 err = nlmsg_perm(nlmsg_type, perm, nlmsg_firewall_perms, in selinux_nlmsg_lookup() 165 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, in selinux_nlmsg_lookup() 170 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, in selinux_nlmsg_lookup() 181 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perms, in selinux_nlmsg_lookup() 188 err = -ENOENT; in selinux_nlmsg_lookup() [all …]
|
D | hooks.c | 3300 int err = 0; in selinux_file_fcntl() local 3305 err = -EINVAL; in selinux_file_fcntl() 3310 err = file_has_perm(cred, file, FILE__WRITE); in selinux_file_fcntl() 3320 err = file_has_perm(cred, file, 0); in selinux_file_fcntl() 3331 err = -EINVAL; in selinux_file_fcntl() 3334 err = file_has_perm(cred, file, FILE__LOCK); in selinux_file_fcntl() 3338 return err; in selinux_file_fcntl() 3866 int err; in selinux_skb_peerlbl_sid() local 3874 err = security_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid); in selinux_skb_peerlbl_sid() 3875 if (unlikely(err)) { in selinux_skb_peerlbl_sid() [all …]
|
D | xfrm.c | 290 int err; in selinux_xfrm_policy_alloc() local 294 err = selinux_xfrm_sec_ctx_alloc(ctxp, uctx, 0); in selinux_xfrm_policy_alloc() 295 if (err == 0) in selinux_xfrm_policy_alloc() 298 return err; in selinux_xfrm_policy_alloc() 358 int err; in selinux_xfrm_state_alloc() local 362 err = selinux_xfrm_sec_ctx_alloc(&x->security, uctx, secid); in selinux_xfrm_state_alloc() 363 if (err == 0) in selinux_xfrm_state_alloc() 365 return err; in selinux_xfrm_state_alloc()
|
D | netif.c | 285 int i, err; in sel_netif_init() local 295 err = avc_add_callback(sel_netif_avc_callback, AVC_CALLBACK_RESET, in sel_netif_init() 297 if (err) in sel_netif_init() 298 panic("avc_add_callback() failed, error %d\n", err); in sel_netif_init() 300 return err; in sel_netif_init()
|
D | selinuxfs.c | 382 goto err; in sel_open_policy() 386 goto err; in sel_open_policy() 391 goto err; in sel_open_policy() 401 goto err; in sel_open_policy() 410 err: in sel_open_policy() 1840 goto err; in sel_fill_super() 1846 goto err; in sel_fill_super() 1852 goto err; in sel_fill_super() 1857 goto err; in sel_fill_super() 1872 goto err; in sel_fill_super() [all …]
|
/security/selinux/ss/ |
D | conditional.c | 235 goto err; in cond_read_bool() 242 goto err; in cond_read_bool() 249 goto err; in cond_read_bool() 252 goto err; in cond_read_bool() 256 goto err; in cond_read_bool() 259 err: in cond_read_bool() 288 goto err; in cond_insertf() 303 goto err; in cond_insertf() 314 goto err; in cond_insertf() 320 goto err; in cond_insertf() [all …]
|
D | services.c | 150 goto err; in selinux_set_mapping() 170 goto err; in selinux_set_mapping() 186 err: in selinux_set_mapping() 2077 goto err; in security_load_policy() 2082 goto err; in security_load_policy() 2090 goto err; in security_load_policy() 2103 goto err; in security_load_policy() 2134 err: in security_load_policy() 2563 goto err; in security_get_bools() 2568 goto err; in security_get_bools() [all …]
|
/security/integrity/ |
D | digsig.c | 40 int err = PTR_ERR(keyring[id]); in integrity_digsig_verify() local 41 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_digsig_verify() 43 return err; in integrity_digsig_verify()
|
/security/keys/ |
D | process_keys.c | 337 key_ref_t key_ref, ret, err; in search_my_process_keyrings() local 348 err = ERR_PTR(-EAGAIN); in search_my_process_keyrings() 366 err = key_ref; in search_my_process_keyrings() 387 err = key_ref; in search_my_process_keyrings() 413 err = key_ref; in search_my_process_keyrings() 433 err = key_ref; in search_my_process_keyrings() 439 key_ref = ret ? ret : err; in search_my_process_keyrings() 459 key_ref_t key_ref, ret = ERR_PTR(-EACCES), err; in search_process_keyrings() local 467 err = key_ref; in search_process_keyrings() 498 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings() [all …]
|
D | compat.c | 43 goto err; in compat_keyctl_instantiate_key_iov() 48 err: in compat_keyctl_instantiate_key_iov()
|
D | keyring.c | 321 long err; in keyring_search_aux() local 329 err = key_task_permission(keyring_ref, cred, KEY_SEARCH); in keyring_search_aux() 330 if (err < 0) { in keyring_search_aux() 331 key_ref = ERR_PTR(err); in keyring_search_aux() 342 err = -EAGAIN; in keyring_search_aux() 416 err = key->type_data.reject_error; in keyring_search_aux() 464 key_ref = ERR_PTR(err); in keyring_search_aux()
|
D | keyctl.c | 1084 goto err; in keyctl_instantiate_key_iov() 1089 err: in keyctl_instantiate_key_iov()
|
/security/selinux/include/ |
D | xfrm.h | 86 int err = selinux_xfrm_decode_session(skb, sid, 0); in selinux_skb_xfrm_sid() local 87 BUG_ON(err); in selinux_skb_xfrm_sid()
|
/security/integrity/evm/ |
D | evm_main.c | 419 goto err; in init_evm() 423 err: in init_evm()
|
/security/tomoyo/ |
D | tomoyo.c | 128 const int err = tomoyo_find_next_domain(bprm); in tomoyo_bprm_check_security() local 130 return err; in tomoyo_bprm_check_security()
|
/security/smack/ |
D | smackfs.c | 1599 int err; in init_smk_fs() local 1604 err = register_filesystem(&smk_fs_type); in init_smk_fs() 1605 if (!err) { in init_smk_fs() 1609 err = PTR_ERR(smackfs_mount); in init_smk_fs() 1617 return err; in init_smk_fs()
|