Home
last modified time | relevance | path

Searched refs:info (Results 1 – 25 of 25) sorted by relevance

/security/yama/
Dyama_lsm.c53 struct access_report_info *info = in __report_access() local
57 target_cmd = kstrdup_quotable_cmdline(info->target, GFP_KERNEL); in __report_access()
58 agent_cmd = kstrdup_quotable_cmdline(info->agent, GFP_KERNEL); in __report_access()
62 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
63 info->agent->pid); in __report_access()
68 put_task_struct(info->agent); in __report_access()
69 put_task_struct(info->target); in __report_access()
70 kfree(info); in __report_access()
77 struct access_report_info *info; in report_access() local
93 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access()
[all …]
/security/apparmor/
Ddomain.c60 const char **info) in may_change_ptraced_domain() argument
83 *info = "ptrace prevents transition"; in may_change_ptraced_domain()
383 const char *name, const char **info) in find_attach() argument
479 *info = "conflicting profile attachments"; in find_attach()
554 const char **info) in x_to_label() argument
580 name, info); in x_to_label()
584 name, info); in x_to_label()
594 *info = "ix fallback"; in x_to_label()
599 *info = "ux fallback"; in x_to_label()
625 const char *info = NULL, *name = NULL, *target = NULL; in profile_transition() local
[all …]
Dmount.c134 struct aa_perms *perms, const char *info, int error) in audit_mount() argument
175 aad(&sa)->info = info; in audit_mount()
322 const char *mntpnt = NULL, *info = NULL; in match_mnt_path_str() local
333 &mntpnt, &info, profile->disconnected); in match_mnt_path_str()
339 info = devinfo; in match_mnt_path_str()
348 info = mnt_info_table[pos]; in match_mnt_path_str()
355 flags, data, AA_MAY_MOUNT, &perms, info, error); in match_mnt_path_str()
377 const char *devname = NULL, *info = NULL; in match_mnt() local
388 devbuffer, &devname, &info, in match_mnt()
395 data, binary, info); in match_mnt()
[all …]
Dpolicy.c581 const char **info) in replacement_allowed() argument
585 *info = "cannot replace immutible profile"; in replacement_allowed()
588 *info = "profile already exists"; in replacement_allowed()
619 const char *info, int error) in audit_policy() argument
625 aad(&sa)->info = info; in audit_policy()
798 const char **info) in __lookup_replace() argument
802 int error = replacement_allowed(*p, noreplace, info); in __lookup_replace()
804 *info = "profile can not be replaced"; in __lookup_replace()
859 const char *ns_name, *info = NULL; in aa_replace_profiles() local
884 info = "policy load has mixed namespaces"; in aa_replace_profiles()
[all …]
Dpath.c198 const char **name, const char **info, const char *disconnected) in aa_path_name() argument
203 if (info && error) { in aa_path_name()
205 *info = "Failed name lookup - deleted entry"; in aa_path_name()
207 *info = "Failed name lookup - disconnected path"; in aa_path_name()
209 *info = "Failed name lookup - name too long"; in aa_path_name()
211 *info = "Failed name lookup"; in aa_path_name()
Dpolicy_unpack.c105 const char *name, const char *info, struct aa_ext *e, in audit_iface() argument
117 aad(&sa)->info = info; in audit_iface()
675 const char *info = "failed to unpack profile"; in unpack_profile() local
698 info = "out of memory"; in unpack_profile()
719 info = "bad xmatch"; in unpack_profile()
725 info = "missing xmatch len"; in unpack_profile()
736 info = "profile missing flags"; in unpack_profile()
739 info = "failed to unpack profile flags"; in unpack_profile()
768 info = "failed to unpack profile capabilities"; in unpack_profile()
778 info = "failed to unpack upper profile capabilities"; in unpack_profile()
[all …]
Dfile.c104 kuid_t ouid, const char *info, int error) in aa_audit_file() argument
115 aad(&sa)->info = info; in aa_audit_file()
171 const char *info = NULL; in path_name() local
174 error = aa_path_name(path, flags, buffer, name, &info, in path_name()
179 NULL, NULL, cond->uid, info, error)); in path_name()
372 const char *info = NULL; in profile_path_link() local
408 info = "target restricted"; in profile_path_link()
434 info = "link not subset of target"; in profile_path_link()
443 NULL, cond->uid, info, error); in profile_path_link()
Dresource.c54 const char *info, int error) in audit_resource() argument
61 aad(&sa)->info = info; in audit_resource()
Daudit.c69 if (aad(sa)->info) { in audit_pre()
71 audit_log_string(ab, aad(sa)->info); in audit_pre()
Dcapability.c131 aad(sa)->info = "optional: no audit"; in profile_capable()
Dlib.c129 aad(&sa)->info = str; in aa_info_message()
Dlsm.c668 aad(&sa)->info = name; in apparmor_setprocattr()
729 static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo *info, in apparmor_task_kill() argument
/security/keys/
Dkeyctl_pkey.c19 kfree(params->info); in keyctl_pkey_params_free()
42 char *c = params->info, *p, *q; in keyctl_pkey_params_parse()
92 params->info = p; in keyctl_pkey_params_get()
119 struct kernel_pkey_query info; in keyctl_pkey_params_get_2() local
132 ret = params->key->type->asym_query(params, &info); in keyctl_pkey_params_get_2()
139 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2()
140 uparams.out_len > info.max_dec_size) in keyctl_pkey_params_get_2()
145 if (uparams.in_len > info.max_sig_size || in keyctl_pkey_params_get_2()
146 uparams.out_len > info.max_data_size) in keyctl_pkey_params_get_2()
Drequest_key.c77 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument
79 struct key *keyring = info->data; in umh_keys_init()
87 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument
89 struct key *keyring = info->data; in umh_keys_cleanup()
99 struct subprocess_info *info; in call_usermodehelper_keys() local
101 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys()
104 if (!info) in call_usermodehelper_keys()
108 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
/security/selinux/ss/
Dhashtab.c147 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument
169 info->slots_used = slots_used; in hashtab_stat()
170 info->max_chain_len = max_chain_len; in hashtab_stat()
Dpolicydb.c168 struct policydb_compat_info *info = NULL; in policydb_lookup_compat() local
172 info = &policydb_compat[i]; in policydb_lookup_compat()
176 return info; in policydb_lookup_compat()
666 struct hashtab_info info; in hash_eval() local
668 hashtab_stat(h, &info); in hash_eval()
670 hash_name, h->nel, info.slots_used, h->size, in hash_eval()
671 info.max_chain_len); in hash_eval()
2073 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, in ocontext_read() argument
2083 for (i = 0; i < info->ocon_num; i++) { in ocontext_read()
2268 struct policydb_compat_info *info; in policydb_read() local
[all …]
Dhashtab.h86 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
/security/integrity/
Dintegrity.h233 const char *cause, int result, int info);
245 int result, int info) in integrity_audit_msg() argument
/security/integrity/evm/
DKconfig27 additional info to the calculation, requires existing EVM
44 additional info to the calculation, requires existing EVM
/security/apparmor/include/
Dpath.h26 const char **name, const char **info,
Daudit.h113 const char *info; member
Dfile.h162 const char *info, int error);
/security/
Dsecurity.c1702 int security_task_kill(struct task_struct *p, struct kernel_siginfo *info, in security_task_kill() argument
1705 return call_int_hook(task_kill, 0, p, info, sig, cred); in security_task_kill()
/security/smack/
Dsmack_lsm.c2183 static int smack_task_kill(struct task_struct *p, struct kernel_siginfo *info, in smack_task_kill() argument
/security/selinux/
Dhooks.c4135 static int selinux_task_kill(struct task_struct *p, struct kernel_siginfo *info, in selinux_task_kill() argument