/security/yama/ |
D | yama_lsm.c | 57 struct access_report_info *info = in __report_access() local 61 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access() 62 agent_cmd = kstrdup_quotable_cmdline(info->agent, GFP_KERNEL); in __report_access() 66 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 67 info->agent->pid); in __report_access() 72 put_task_struct(info->agent); in __report_access() 73 put_task_struct(info->target); in __report_access() 74 kfree(info); in __report_access() 81 struct access_report_info *info; in report_access() local 97 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access() [all …]
|
/security/apparmor/ |
D | domain.c | 63 const char **info) in may_change_ptraced_domain() argument 86 *info = "ptrace prevents transition"; in may_change_ptraced_domain() 425 const char **info) in x_to_label() argument 465 *info = "ix fallback"; in x_to_label() 470 *info = "ux fallback"; in x_to_label() 494 const char *info = NULL, *name = NULL, *target = NULL; in profile_transition() local 505 &name, &info, profile->disconnected); in profile_transition() 532 new = x_to_label(profile, name, perms.xindex, &target, &info); in profile_transition() 533 if (new && new->proxy == profile->label.proxy && info) { in profile_transition() 538 info = "profile transition not found"; in profile_transition() [all …]
|
D | policy.c | 579 const char **info) in replacement_allowed() argument 583 *info = "cannot replace immutible profile"; in replacement_allowed() 586 *info = "profile already exists"; in replacement_allowed() 617 const char *info, int error) in audit_policy() argument 623 aad(&sa)->info = info; in audit_policy() 796 const char **info) in __lookup_replace() argument 800 int error = replacement_allowed(*p, noreplace, info); in __lookup_replace() 802 *info = "profile can not be replaced"; in __lookup_replace() 856 const char *ns_name, *info = NULL; in aa_replace_profiles() local 881 info = "policy load has mixed namespaces"; in aa_replace_profiles() [all …]
|
D | mount.c | 137 struct aa_perms *perms, const char *info, int error) in audit_mount() argument 178 aad(&sa)->info = info; in audit_mount() 326 const char *mntpnt = NULL, *info = NULL; in match_mnt_path_str() local 337 &mntpnt, &info, profile->disconnected); in match_mnt_path_str() 343 info = devinfo; in match_mnt_path_str() 352 info = mnt_info_table[pos]; in match_mnt_path_str() 359 flags, data, AA_MAY_MOUNT, &perms, info, error); in match_mnt_path_str() 381 const char *devname = NULL, *info = NULL; in match_mnt() local 392 devbuffer, &devname, &info, in match_mnt() 399 data, binary, info); in match_mnt() [all …]
|
D | path.c | 202 const char **name, const char **info, const char *disconnected) in aa_path_name() argument 207 if (info && error) { in aa_path_name() 209 *info = "Failed name lookup - deleted entry"; in aa_path_name() 211 *info = "Failed name lookup - disconnected path"; in aa_path_name() 213 *info = "Failed name lookup - name too long"; in aa_path_name() 215 *info = "Failed name lookup"; in aa_path_name()
|
D | policy_unpack.c | 108 const char *name, const char *info, struct aa_ext *e, in audit_iface() argument 120 aad(&sa)->info = info; in audit_iface() 586 const char *info = "failed to unpack profile"; in unpack_profile() local 609 info = "out of memory"; in unpack_profile() 630 info = "bad xmatch"; in unpack_profile() 636 info = "missing xmatch len"; in unpack_profile() 647 info = "profile missing flags"; in unpack_profile() 650 info = "failed to unpack profile flags"; in unpack_profile() 679 info = "failed to unpack profile capabilities"; in unpack_profile() 689 info = "failed to unpack upper profile capabilities"; in unpack_profile() [all …]
|
D | file.c | 106 kuid_t ouid, const char *info, int error) in aa_audit_file() argument 117 aad(&sa)->info = info; in aa_audit_file() 173 const char *info = NULL; in path_name() local 176 error = aa_path_name(path, flags, buffer, name, &info, in path_name() 181 NULL, NULL, cond->uid, info, error)); in path_name() 380 const char *info = NULL; in profile_path_link() local 416 info = "target restricted"; in profile_path_link() 442 info = "link not subset of target"; in profile_path_link() 451 NULL, cond->uid, info, error); in profile_path_link()
|
D | resource.c | 58 const char *info, int error) in audit_resource() argument 65 aad(&sa)->info = info; in audit_resource()
|
D | audit.c | 73 if (aad(sa)->info) { in audit_pre() 75 audit_log_string(ab, aad(sa)->info); in audit_pre()
|
D | capability.c | 135 aad(sa)->info = "optional: no audit"; in profile_capable()
|
D | lsm.c | 667 aad(&sa)->info = name; in apparmor_setprocattr() 719 static int apparmor_task_kill(struct task_struct *target, struct siginfo *info, in apparmor_task_kill() argument
|
D | lib.c | 133 aad(&sa)->info = str; in aa_info_message()
|
/security/keys/ |
D | request_key.c | 55 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument 57 struct key *keyring = info->data; in umh_keys_init() 65 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument 67 struct key *keyring = info->data; in umh_keys_cleanup() 77 struct subprocess_info *info; in call_usermodehelper_keys() local 79 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys() 82 if (!info) in call_usermodehelper_keys() 86 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
|
/security/selinux/ss/ |
D | hashtab.c | 145 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument 167 info->slots_used = slots_used; in hashtab_stat() 168 info->max_chain_len = max_chain_len; in hashtab_stat()
|
D | policydb.c | 171 struct policydb_compat_info *info = NULL; in policydb_lookup_compat() local 175 info = &policydb_compat[i]; in policydb_lookup_compat() 179 return info; in policydb_lookup_compat() 508 struct hashtab_info info; in hash_eval() local 510 hashtab_stat(h, &info); in hash_eval() 513 info.slots_used, h->size, info.max_chain_len); in hash_eval() 2110 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, in ocontext_read() argument 2120 for (i = 0; i < info->ocon_num; i++) { in ocontext_read() 2305 struct policydb_compat_info *info; in policydb_read() local 2406 info = policydb_lookup_compat(p->policyvers); in policydb_read() [all …]
|
D | hashtab.h | 86 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
|
/security/integrity/ |
D | integrity.h | 193 const char *cause, int result, int info); 198 int result, int info) in integrity_audit_msg() argument
|
/security/integrity/evm/ |
D | Kconfig | 25 additional info to the calculation, requires existing EVM 42 additional info to the calculation, requires existing EVM
|
/security/apparmor/include/ |
D | path.h | 30 const char **name, const char **info,
|
D | audit.h | 117 const char *info; member
|
D | file.h | 163 const char *info, int error);
|
/security/ |
D | security.c | 1126 int security_task_kill(struct task_struct *p, struct siginfo *info, in security_task_kill() argument 1129 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill()
|
/security/smack/ |
D | smack_lsm.c | 2239 static int smack_task_kill(struct task_struct *p, struct siginfo *info, in smack_task_kill() argument
|
/security/selinux/ |
D | hooks.c | 4076 static int selinux_task_kill(struct task_struct *p, struct siginfo *info, in selinux_task_kill() argument
|