Home
last modified time | relevance | path

Searched refs:info (Results 1 – 24 of 24) sorted by relevance

/security/yama/
Dyama_lsm.c57 struct access_report_info *info = in __report_access() local
61 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access()
62 agent_cmd = kstrdup_quotable_cmdline(info->agent, GFP_KERNEL); in __report_access()
66 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
67 info->agent->pid); in __report_access()
72 put_task_struct(info->agent); in __report_access()
73 put_task_struct(info->target); in __report_access()
74 kfree(info); in __report_access()
81 struct access_report_info *info; in report_access() local
97 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access()
[all …]
/security/apparmor/
Ddomain.c63 const char **info) in may_change_ptraced_domain() argument
86 *info = "ptrace prevents transition"; in may_change_ptraced_domain()
425 const char **info) in x_to_label() argument
465 *info = "ix fallback"; in x_to_label()
470 *info = "ux fallback"; in x_to_label()
494 const char *info = NULL, *name = NULL, *target = NULL; in profile_transition() local
505 &name, &info, profile->disconnected); in profile_transition()
532 new = x_to_label(profile, name, perms.xindex, &target, &info); in profile_transition()
533 if (new && new->proxy == profile->label.proxy && info) { in profile_transition()
538 info = "profile transition not found"; in profile_transition()
[all …]
Dpolicy.c579 const char **info) in replacement_allowed() argument
583 *info = "cannot replace immutible profile"; in replacement_allowed()
586 *info = "profile already exists"; in replacement_allowed()
617 const char *info, int error) in audit_policy() argument
623 aad(&sa)->info = info; in audit_policy()
796 const char **info) in __lookup_replace() argument
800 int error = replacement_allowed(*p, noreplace, info); in __lookup_replace()
802 *info = "profile can not be replaced"; in __lookup_replace()
856 const char *ns_name, *info = NULL; in aa_replace_profiles() local
881 info = "policy load has mixed namespaces"; in aa_replace_profiles()
[all …]
Dmount.c137 struct aa_perms *perms, const char *info, int error) in audit_mount() argument
178 aad(&sa)->info = info; in audit_mount()
326 const char *mntpnt = NULL, *info = NULL; in match_mnt_path_str() local
337 &mntpnt, &info, profile->disconnected); in match_mnt_path_str()
343 info = devinfo; in match_mnt_path_str()
352 info = mnt_info_table[pos]; in match_mnt_path_str()
359 flags, data, AA_MAY_MOUNT, &perms, info, error); in match_mnt_path_str()
381 const char *devname = NULL, *info = NULL; in match_mnt() local
392 devbuffer, &devname, &info, in match_mnt()
399 data, binary, info); in match_mnt()
[all …]
Dpath.c202 const char **name, const char **info, const char *disconnected) in aa_path_name() argument
207 if (info && error) { in aa_path_name()
209 *info = "Failed name lookup - deleted entry"; in aa_path_name()
211 *info = "Failed name lookup - disconnected path"; in aa_path_name()
213 *info = "Failed name lookup - name too long"; in aa_path_name()
215 *info = "Failed name lookup"; in aa_path_name()
Dpolicy_unpack.c108 const char *name, const char *info, struct aa_ext *e, in audit_iface() argument
120 aad(&sa)->info = info; in audit_iface()
586 const char *info = "failed to unpack profile"; in unpack_profile() local
609 info = "out of memory"; in unpack_profile()
630 info = "bad xmatch"; in unpack_profile()
636 info = "missing xmatch len"; in unpack_profile()
647 info = "profile missing flags"; in unpack_profile()
650 info = "failed to unpack profile flags"; in unpack_profile()
679 info = "failed to unpack profile capabilities"; in unpack_profile()
689 info = "failed to unpack upper profile capabilities"; in unpack_profile()
[all …]
Dfile.c106 kuid_t ouid, const char *info, int error) in aa_audit_file() argument
117 aad(&sa)->info = info; in aa_audit_file()
173 const char *info = NULL; in path_name() local
176 error = aa_path_name(path, flags, buffer, name, &info, in path_name()
181 NULL, NULL, cond->uid, info, error)); in path_name()
380 const char *info = NULL; in profile_path_link() local
416 info = "target restricted"; in profile_path_link()
442 info = "link not subset of target"; in profile_path_link()
451 NULL, cond->uid, info, error); in profile_path_link()
Dresource.c58 const char *info, int error) in audit_resource() argument
65 aad(&sa)->info = info; in audit_resource()
Daudit.c73 if (aad(sa)->info) { in audit_pre()
75 audit_log_string(ab, aad(sa)->info); in audit_pre()
Dcapability.c135 aad(sa)->info = "optional: no audit"; in profile_capable()
Dlsm.c667 aad(&sa)->info = name; in apparmor_setprocattr()
719 static int apparmor_task_kill(struct task_struct *target, struct siginfo *info, in apparmor_task_kill() argument
Dlib.c133 aad(&sa)->info = str; in aa_info_message()
/security/keys/
Drequest_key.c55 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument
57 struct key *keyring = info->data; in umh_keys_init()
65 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument
67 struct key *keyring = info->data; in umh_keys_cleanup()
77 struct subprocess_info *info; in call_usermodehelper_keys() local
79 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys()
82 if (!info) in call_usermodehelper_keys()
86 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
/security/selinux/ss/
Dhashtab.c145 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument
167 info->slots_used = slots_used; in hashtab_stat()
168 info->max_chain_len = max_chain_len; in hashtab_stat()
Dpolicydb.c171 struct policydb_compat_info *info = NULL; in policydb_lookup_compat() local
175 info = &policydb_compat[i]; in policydb_lookup_compat()
179 return info; in policydb_lookup_compat()
508 struct hashtab_info info; in hash_eval() local
510 hashtab_stat(h, &info); in hash_eval()
513 info.slots_used, h->size, info.max_chain_len); in hash_eval()
2110 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, in ocontext_read() argument
2120 for (i = 0; i < info->ocon_num; i++) { in ocontext_read()
2305 struct policydb_compat_info *info; in policydb_read() local
2406 info = policydb_lookup_compat(p->policyvers); in policydb_read()
[all …]
Dhashtab.h86 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
/security/integrity/
Dintegrity.h193 const char *cause, int result, int info);
198 int result, int info) in integrity_audit_msg() argument
/security/integrity/evm/
DKconfig25 additional info to the calculation, requires existing EVM
42 additional info to the calculation, requires existing EVM
/security/apparmor/include/
Dpath.h30 const char **name, const char **info,
Daudit.h117 const char *info; member
Dfile.h163 const char *info, int error);
/security/
Dsecurity.c1126 int security_task_kill(struct task_struct *p, struct siginfo *info, in security_task_kill() argument
1129 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill()
/security/smack/
Dsmack_lsm.c2239 static int smack_task_kill(struct task_struct *p, struct siginfo *info, in smack_task_kill() argument
/security/selinux/
Dhooks.c4076 static int selinux_task_kill(struct task_struct *p, struct siginfo *info, in selinux_task_kill() argument