/security/apparmor/include/ |
H A D | path.h | 30 const char **name, const char **info);
|
H A D | audit.h | 111 const char *info; member in struct:apparmor_audit_data
|
H A D | file.h | 100 * also add delegation info. 149 const char *target, kuid_t ouid, const char *info, int error);
|
/security/apparmor/ |
H A D | path.c | 162 int size, char **name, const char **info) 174 if (info && error) { 176 *info = "Failed name lookup - deleted entry"; 178 *info = "Failed name lookup - disconnected path"; 180 *info = "Failed name lookup - name too long"; 182 *info = "Failed name lookup"; 194 * @info: Returns - information on why the path lookup failed (MAYBE NULL) 208 const char **info) 222 error = get_name_to_buffer(path, flags, buf, size, &str, info); 230 *info 161 get_name_to_buffer(struct path *path, int flags, char *buffer, int size, char **name, const char **info) argument 207 aa_path_name(struct path *path, int flags, char **buffer, const char **name, const char **info) argument [all...] |
H A D | domain.c | 349 const char *name = NULL, *target = NULL, *info = NULL; local 370 &name, &info); 403 info = "change_profile onexec"; 431 info = "ix fallback"; 436 info = "ux fallback"; 439 info = "profile not found"; 449 info = "could not create null profile"; 517 name, target, cond.uid, info, error); 616 const char *target = NULL, *info = NULL; local 634 info 754 const char *name = NULL, *info = NULL; local [all...] |
H A D | file.c | 101 * @info: extra information message (MAYBE NULL) 108 const char *target, kuid_t ouid, const char *info, int error) 120 aad.info = info; 274 * @cond: conditional info for this request (NOT NULL) 283 const char *name, *info = NULL; local 287 error = aa_path_name(path, flags, &buffer, &name, &info); 294 info = NULL; 304 NULL, cond->uid, info, error); 358 const char *lname, *tname = NULL, *info local 106 aa_audit_file(struct aa_profile *profile, struct file_perms *perms, gfp_t gfp, int op, u32 request, const char *name, const char *target, kuid_t ouid, const char *info, int error) argument [all...] |
H A D | policy.c | 874 * @info: Returns - info about why replacement failed (NOT NULL) 879 const char **info) 883 *info = "cannot replace immutible profile"; 886 *info = "profile already exists"; 898 * @info: any extra information to be audited (MAYBE NULL) 903 static int audit_policy(int op, gfp_t gfp, const char *name, const char *info, argument 912 aad.info = info; 1036 * @info 878 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument 1040 __lookup_replace(struct aa_namespace *ns, const char *hname, bool noreplace, struct aa_profile **p, const char **info) argument 1070 const char *ns_name, *name = NULL, *info = NULL; local 1244 const char *name = fqname, *info = NULL; local [all...] |
H A D | audit.c | 125 if (sa->aad->info) { 126 audit_log_format(ab, " info="); 127 audit_log_string(ab, sa->aad->info);
|
H A D | lib.c | 73 aad.info = str;
|
H A D | policy_unpack.c | 86 * @info: any extra info about the failure (MAYBE NULL) 87 * @e: buffer position info 93 const char *info, struct aa_ext *e, int error) 104 aad.info = info; 92 audit_iface(struct aa_profile *new, const char *name, const char *info, struct aa_ext *e, int error) argument
|
H A D | lsm.c | 158 * @cond: conditional info for the permission request (NOT NULL) 181 * @cond: conditional info for the permission request (NOT NULL) 600 aad.info = name;
|
/security/selinux/ss/ |
H A D | hashtab.h | 84 /* Fill info with some hash table statistics */ 85 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
|
H A D | hashtab.c | 144 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) argument 166 info->slots_used = slots_used; 167 info->max_chain_len = max_chain_len;
|
H A D | policydb.c | 161 struct policydb_compat_info *info = NULL; local 165 info = &policydb_compat[i]; 169 return info; 491 struct hashtab_info info; local 493 hashtab_stat(h, &info); 496 info.slots_used, h->size, info.max_chain_len); 2104 static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, argument 2113 for (i = 0; i < info->ocon_num; i++) { 2239 struct policydb_compat_info *info; local 3055 ocontext_write(struct policydb *p, struct policydb_compat_info *info, void *fp) argument 3337 struct policydb_compat_info *info; local [all...] |
/security/integrity/ |
H A D | integrity.h | 164 const char *cause, int result, int info); 169 int result, int info) 166 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info) argument
|
/security/keys/ |
H A D | request_key.c | 56 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) argument 58 struct key *keyring = info->data; 66 static void umh_keys_cleanup(struct subprocess_info *info) argument 68 struct key *keyring = info->data; 78 struct subprocess_info *info; local 80 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, 83 if (!info) 87 return call_usermodehelper_exec(info, wait);
|
/security/ |
H A D | security.c | 957 int security_task_kill(struct task_struct *p, struct siginfo *info, argument 960 return security_ops->task_kill(p, info, sig, secid);
|
H A D | capability.c | 485 static int cap_task_kill(struct task_struct *p, struct siginfo *info, argument
|
/security/smack/ |
H A D | smack_lsm.c | 1306 * @inode: inode to extract the info from 1974 * @info: unused 1983 static int smack_task_kill(struct task_struct *p, struct siginfo *info, argument
|
/security/selinux/ |
H A D | hooks.c | 3747 static int selinux_task_kill(struct task_struct *p, struct siginfo *info, argument
|