/security/yama/ |
D | yama_lsm.c | 53 struct access_report_info *info = in __report_access() local 57 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access() 58 agent_cmd = kstrdup_quotable_cmdline(info->agent, GFP_KERNEL); in __report_access() 62 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 63 info->agent->pid); in __report_access() 68 put_task_struct(info->agent); in __report_access() 69 put_task_struct(info->target); in __report_access() 70 kfree(info); in __report_access() 77 struct access_report_info *info; in report_access() local 93 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access() [all …]
|
/security/apparmor/ |
D | domain.c | 60 const char **info) in may_change_ptraced_domain() argument 83 *info = "ptrace prevents transition"; in may_change_ptraced_domain() 383 const char *name, const char **info) in find_attach() argument 479 *info = "conflicting profile attachments"; in find_attach() 554 const char **info) in x_to_label() argument 580 name, info); in x_to_label() 584 name, info); in x_to_label() 594 *info = "ix fallback"; in x_to_label() 599 *info = "ux fallback"; in x_to_label() 625 const char *info = NULL, *name = NULL, *target = NULL; in profile_transition() local [all …]
|
D | mount.c | 134 struct aa_perms *perms, const char *info, int error) in audit_mount() argument 175 aad(&sa)->info = info; in audit_mount() 322 const char *mntpnt = NULL, *info = NULL; in match_mnt_path_str() local 333 &mntpnt, &info, profile->disconnected); in match_mnt_path_str() 339 info = devinfo; in match_mnt_path_str() 348 info = mnt_info_table[pos]; in match_mnt_path_str() 355 flags, data, AA_MAY_MOUNT, &perms, info, error); in match_mnt_path_str() 377 const char *devname = NULL, *info = NULL; in match_mnt() local 388 devbuffer, &devname, &info, in match_mnt() 395 data, binary, info); in match_mnt() [all …]
|
D | policy.c | 581 const char **info) in replacement_allowed() argument 585 *info = "cannot replace immutible profile"; in replacement_allowed() 588 *info = "profile already exists"; in replacement_allowed() 619 const char *info, int error) in audit_policy() argument 625 aad(&sa)->info = info; in audit_policy() 798 const char **info) in __lookup_replace() argument 802 int error = replacement_allowed(*p, noreplace, info); in __lookup_replace() 804 *info = "profile can not be replaced"; in __lookup_replace() 859 const char *ns_name, *info = NULL; in aa_replace_profiles() local 884 info = "policy load has mixed namespaces"; in aa_replace_profiles() [all …]
|
D | path.c | 198 const char **name, const char **info, const char *disconnected) in aa_path_name() argument 203 if (info && error) { in aa_path_name() 205 *info = "Failed name lookup - deleted entry"; in aa_path_name() 207 *info = "Failed name lookup - disconnected path"; in aa_path_name() 209 *info = "Failed name lookup - name too long"; in aa_path_name() 211 *info = "Failed name lookup"; in aa_path_name()
|
D | policy_unpack.c | 105 const char *name, const char *info, struct aa_ext *e, in audit_iface() argument 117 aad(&sa)->info = info; in audit_iface() 675 const char *info = "failed to unpack profile"; in unpack_profile() local 698 info = "out of memory"; in unpack_profile() 719 info = "bad xmatch"; in unpack_profile() 725 info = "missing xmatch len"; in unpack_profile() 736 info = "profile missing flags"; in unpack_profile() 739 info = "failed to unpack profile flags"; in unpack_profile() 768 info = "failed to unpack profile capabilities"; in unpack_profile() 778 info = "failed to unpack upper profile capabilities"; in unpack_profile() [all …]
|
D | file.c | 104 kuid_t ouid, const char *info, int error) in aa_audit_file() argument 115 aad(&sa)->info = info; in aa_audit_file() 171 const char *info = NULL; in path_name() local 174 error = aa_path_name(path, flags, buffer, name, &info, in path_name() 179 NULL, NULL, cond->uid, info, error)); in path_name() 372 const char *info = NULL; in profile_path_link() local 408 info = "target restricted"; in profile_path_link() 434 info = "link not subset of target"; in profile_path_link() 443 NULL, cond->uid, info, error); in profile_path_link()
|
D | resource.c | 54 const char *info, int error) in audit_resource() argument 61 aad(&sa)->info = info; in audit_resource()
|
D | audit.c | 69 if (aad(sa)->info) { in audit_pre() 71 audit_log_string(ab, aad(sa)->info); in audit_pre()
|
D | capability.c | 131 aad(sa)->info = "optional: no audit"; in profile_capable()
|
D | lib.c | 129 aad(&sa)->info = str; in aa_info_message()
|
D | lsm.c | 668 aad(&sa)->info = name; in apparmor_setprocattr() 729 static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo *info, in apparmor_task_kill() argument
|
/security/keys/ |
D | keyctl_pkey.c | 19 kfree(params->info); in keyctl_pkey_params_free() 42 char *c = params->info, *p, *q; in keyctl_pkey_params_parse() 92 params->info = p; in keyctl_pkey_params_get() 119 struct kernel_pkey_query info; in keyctl_pkey_params_get_2() local 132 ret = params->key->type->asym_query(params, &info); in keyctl_pkey_params_get_2() 139 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2() 140 uparams.out_len > info.max_dec_size) in keyctl_pkey_params_get_2() 145 if (uparams.in_len > info.max_sig_size || in keyctl_pkey_params_get_2() 146 uparams.out_len > info.max_data_size) in keyctl_pkey_params_get_2()
|
D | request_key.c | 77 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument 79 struct key *keyring = info->data; in umh_keys_init() 87 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument 89 struct key *keyring = info->data; in umh_keys_cleanup() 99 struct subprocess_info *info; in call_usermodehelper_keys() local 101 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys() 104 if (!info) in call_usermodehelper_keys() 108 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
|
/security/selinux/ss/ |
D | hashtab.c | 147 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument 169 info->slots_used = slots_used; in hashtab_stat() 170 info->max_chain_len = max_chain_len; in hashtab_stat()
|
D | policydb.c | 168 struct policydb_compat_info *info = NULL; in policydb_lookup_compat() local 172 info = &policydb_compat[i]; in policydb_lookup_compat() 176 return info; in policydb_lookup_compat() 666 struct hashtab_info info; in hash_eval() local 668 hashtab_stat(h, &info); in hash_eval() 670 hash_name, h->nel, info.slots_used, h->size, in hash_eval() 671 info.max_chain_len); in hash_eval() 2073 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, in ocontext_read() argument 2083 for (i = 0; i < info->ocon_num; i++) { in ocontext_read() 2268 struct policydb_compat_info *info; in policydb_read() local [all …]
|
D | hashtab.h | 86 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
|
/security/integrity/ |
D | integrity.h | 233 const char *cause, int result, int info); 245 int result, int info) in integrity_audit_msg() argument
|
/security/integrity/evm/ |
D | Kconfig | 27 additional info to the calculation, requires existing EVM 44 additional info to the calculation, requires existing EVM
|
/security/apparmor/include/ |
D | path.h | 26 const char **name, const char **info,
|
D | audit.h | 113 const char *info; member
|
D | file.h | 162 const char *info, int error);
|
/security/ |
D | security.c | 1702 int security_task_kill(struct task_struct *p, struct kernel_siginfo *info, in security_task_kill() argument 1705 return call_int_hook(task_kill, 0, p, info, sig, cred); in security_task_kill()
|
/security/smack/ |
D | smack_lsm.c | 2183 static int smack_task_kill(struct task_struct *p, struct kernel_siginfo *info, in smack_task_kill() argument
|
/security/selinux/ |
D | hooks.c | 4135 static int selinux_task_kill(struct task_struct *p, struct kernel_siginfo *info, in selinux_task_kill() argument
|