Searched refs:info (Results 1 - 20 of 20) sorted by relevance

/security/apparmor/include/
H A Dpath.h30 const char **name, const char **info);
H A Daudit.h111 const char *info; member in struct:apparmor_audit_data
H A Dfile.h100 * also add delegation info.
149 const char *target, kuid_t ouid, const char *info, int error);
/security/apparmor/
H A Dpath.c162 int size, char **name, const char **info)
174 if (info && error) {
176 *info = "Failed name lookup - deleted entry";
178 *info = "Failed name lookup - disconnected path";
180 *info = "Failed name lookup - name too long";
182 *info = "Failed name lookup";
194 * @info: Returns - information on why the path lookup failed (MAYBE NULL)
208 const char **info)
222 error = get_name_to_buffer(path, flags, buf, size, &str, info);
230 *info
161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument
207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument
[all...]
H A Ddomain.c349 const char *name = NULL, *target = NULL, *info = NULL; local
370 &name, &info);
403 info = "change_profile onexec";
431 info = "ix fallback";
436 info = "ux fallback";
439 info = "profile not found";
449 info = "could not create null profile";
517 name, target, cond.uid, info, error);
616 const char *target = NULL, *info = NULL; local
634 info
754 const char *name = NULL, *info = NULL; local
[all...]
H A Dfile.c101 * @info: extra information message (MAYBE NULL)
108 const char *target, kuid_t ouid, const char *info, int error)
120 aad.info = info;
274 * @cond: conditional info for this request (NOT NULL)
283 const char *name, *info = NULL; local
287 error = aa_path_name(path, flags, &buffer, &name, &info);
294 info = NULL;
304 NULL, cond->uid, info, error);
358 const char *lname, *tname = NULL, *info local
106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument
[all...]
H A Dpolicy.c874 * @info: Returns - info about why replacement failed (NOT NULL)
879 const char **info)
883 *info = "cannot replace immutible profile";
886 *info = "profile already exists";
898 * @info: any extra information to be audited (MAYBE NULL)
903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, argument
912 aad.info = info;
1036 * @info
878 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument
1040 __lookup_replace(struct aa_namespace *ns, const char *hname, bool noreplace, struct aa_profile **p, const char **info) argument
1070 const char *ns_name, *name = NULL, *info = NULL; local
1244 const char *name = fqname, *info = NULL; local
[all...]
H A Daudit.c125 if (sa->aad->info) {
126 audit_log_format(ab, " info=");
127 audit_log_string(ab, sa->aad->info);
H A Dlib.c73 aad.info = str;
H A Dpolicy_unpack.c86 * @info: any extra info about the failure (MAYBE NULL)
87 * @e: buffer position info
93 const char *info, struct aa_ext *e, int error)
104 aad.info = info;
92 audit_iface(struct aa_profile *new, const char *name, const char *info, struct aa_ext *e, int error) argument
H A Dlsm.c158 * @cond: conditional info for the permission request (NOT NULL)
181 * @cond: conditional info for the permission request (NOT NULL)
600 aad.info = name;
/security/selinux/ss/
H A Dhashtab.h84 /* Fill info with some hash table statistics */
85 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
H A Dhashtab.c144 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) argument
166 info->slots_used = slots_used;
167 info->max_chain_len = max_chain_len;
H A Dpolicydb.c161 struct policydb_compat_info *info = NULL; local
165 info = &policydb_compat[i];
169 return info;
491 struct hashtab_info info; local
493 hashtab_stat(h, &info);
496 info.slots_used, h->size, info.max_chain_len);
2104 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, argument
2113 for (i = 0; i < info->ocon_num; i++) {
2239 struct policydb_compat_info *info; local
3055 ocontext_write(struct policydb *p, struct policydb_compat_info *info, void *fp) argument
3337 struct policydb_compat_info *info; local
[all...]
/security/integrity/
H A Dintegrity.h164 const char *cause, int result, int info);
169 int result, int info)
166 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info) argument
/security/keys/
H A Drequest_key.c56 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) argument
58 struct key *keyring = info->data;
66 static void umh_keys_cleanup(struct subprocess_info *info) argument
68 struct key *keyring = info->data;
78 struct subprocess_info *info; local
80 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL,
83 if (!info)
87 return call_usermodehelper_exec(info, wait);
/security/
H A Dsecurity.c957 int security_task_kill(struct task_struct *p, struct siginfo *info, argument
960 return security_ops->task_kill(p, info, sig, secid);
H A Dcapability.c485 static int cap_task_kill(struct task_struct *p, struct siginfo *info, argument
/security/smack/
H A Dsmack_lsm.c1306 * @inode: inode to extract the info from
1974 * @info: unused
1983 static int smack_task_kill(struct task_struct *p, struct siginfo *info, argument
/security/selinux/
H A Dhooks.c3747 static int selinux_task_kill(struct task_struct *p, struct siginfo *info, argument

Completed in 1497 milliseconds