| /security/ipe/ |
| A D | digest.c | 31 info = kzalloc(sizeof(*info), GFP_KERNEL); in ipe_digest_parse() 32 if (!info) in ipe_digest_parse() 63 info->alg = alg; in ipe_digest_parse() 64 info->digest = digest; in ipe_digest_parse() 65 return info; in ipe_digest_parse() 70 kfree(info); in ipe_digest_parse() 97 if (IS_ERR_OR_NULL(info)) in ipe_digest_free() 100 kfree(info->alg); in ipe_digest_free() 101 kfree(info->digest); in ipe_digest_free() 102 kfree(info); in ipe_digest_free() [all …]
|
| A D | hooks.c | 243 struct digest_info *info = NULL; in ipe_bdev_setintegrity() local 262 info = kzalloc(sizeof(*info), GFP_KERNEL); in ipe_bdev_setintegrity() 263 if (!info) in ipe_bdev_setintegrity() 266 info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL); in ipe_bdev_setintegrity() 267 if (!info->digest) in ipe_bdev_setintegrity() 270 info->alg = kstrdup(digest->alg, GFP_KERNEL); in ipe_bdev_setintegrity() 271 if (!info->alg) in ipe_bdev_setintegrity() 274 info->digest_len = digest->digest_len; in ipe_bdev_setintegrity() 277 blob->root_hash = info; in ipe_bdev_setintegrity() 281 ipe_digest_free(info); in ipe_bdev_setintegrity()
|
| A D | eval.c | 203 struct digest_info info; in evaluate_fsv_digest() local 213 info.alg = hash_algo_name[alg]; in evaluate_fsv_digest() 214 info.digest = digest; in evaluate_fsv_digest() 215 info.digest_len = hash_digest_size[alg]; in evaluate_fsv_digest() 217 return ipe_digest_eval(p->value, &info); in evaluate_fsv_digest()
|
| /security/yama/ |
| A D | yama_lsm.c | 63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access() 64 info->agent->pid); in __report_access() 69 put_task_struct(info->agent); in __report_access() 70 put_task_struct(info->target); in __report_access() 71 kfree(info); in __report_access() 92 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access() 93 if (!info) in report_access() 98 info->access = access; in report_access() 99 info->target = target; in report_access() 100 info->agent = agent; in report_access() [all …]
|
| /security/apparmor/ |
| A D | domain.c | 50 const char **info) in may_change_ptraced_domain() argument 572 const char **info) in x_to_label() argument 601 name, info); in x_to_label() 605 name, info); in x_to_label() 619 old_info = *info; in x_to_label() 629 old_info = *info; in x_to_label() 699 if (info) { in profile_transition() 708 info, error); in profile_transition() 723 &info); in profile_transition() 735 if (info) { in profile_transition() [all …]
|
| A D | mount.c | 181 ad.info = info; in audit_mount() 331 info = devinfo; in match_mnt_path_str() 340 info = mnt_info_table[pos]; in match_mnt_path_str() 384 devbuffer, &devname, &info, in match_mnt() 391 type, flags, data, binary, info); in match_mnt() 607 const char *name = NULL, *info = NULL; in profile_umount() local 618 &info, profile->disconnected); in profile_umount() 684 old_buffer, &old_name, &info, in build_pivotroot() 689 new_buffer, &new_name, &info, in build_pivotroot() 709 &perms, info, error); in build_pivotroot() [all …]
|
| A D | policy_unpack.c | 76 ad.info = info; in audit_iface() 714 const char **info) in unpack_pdb() argument 755 *info = "missing required dfa"; in unpack_pdb() 871 info = "empty profile name"; in unpack_profile() 876 info = "out of memory"; in unpack_profile() 885 info = "out of memory"; in unpack_profile() 900 info = "bad xmatch"; in unpack_profile() 907 info = "missing xmatch len"; in unpack_profile() 933 info = "profile missing flags"; in unpack_profile() 1032 &info); in unpack_profile() [all …]
|
| A D | path.c | 198 const char **name, const char **info, const char *disconnected) in aa_path_name() argument 203 if (info && error) { in aa_path_name() 205 *info = "Failed name lookup - deleted entry"; in aa_path_name() 207 *info = "Failed name lookup - disconnected path"; in aa_path_name() 209 *info = "Failed name lookup - name too long"; in aa_path_name() 211 *info = "Failed name lookup"; in aa_path_name()
|
| A D | policy.c | 764 const char **info) in replacement_allowed() argument 771 *info = "profile already exists"; in replacement_allowed() 803 const char *info, int error) in audit_policy() argument 809 ad.info = info; in audit_policy() 1031 const char **info) in __lookup_replace() argument 1171 &ent->old, &info); in aa_replace_profiles() 1178 &ent->rename, &info); in aa_replace_profiles() 1246 info = "failed to create"; in aa_replace_profiles() 1315 info, error); in aa_replace_profiles() 1360 info = "no profile specified"; in aa_remove_profiles() [all …]
|
| A D | af_unix.c | 89 const char **info) in match_to_local() argument 92 protocol, NULL, info); in match_to_local() 99 *info = "failed local label match"; in match_to_local() 125 const char **info) in match_to_sk() argument 141 const char **info) in match_to_cmd() argument 166 *info = "failed peer address match"; in match_to_peer() 215 &ad->info); in profile_create_perm() 245 &p, &ad->info); in profile_sk_perm() 276 &p, &ad->info); in profile_bind_perm() 342 unix_sk(sk), &p, &ad->info); in profile_accept_perm() [all …]
|
| A D | file.c | 99 kuid_t ouid, const char *info, int error) in aa_audit_file() argument 110 ad.info = info; in aa_audit_file() 154 const char *info = NULL; in path_name() local 157 error = aa_path_name(path, flags, buffer, name, &info, in path_name() 163 NULL, NULL, cond->uid, info, error)); in path_name() 328 const char *info = NULL; in profile_path_link() local 367 info = "target restricted"; in profile_path_link() 393 info = "link not subset of target"; in profile_path_link() 403 NULL, cond->uid, info, error); in profile_path_link()
|
| A D | resource.c | 59 const char *info, int error) in audit_resource() argument 68 ad.info = info; in audit_resource()
|
| A D | net.c | 226 struct aa_perms **p, const char **info) in aa_match_to_prot() argument 230 *info = "failed af match"; in aa_match_to_prot() 240 *info = "failed protocol match"; in aa_match_to_prot() 243 *info = "failed type match"; in aa_match_to_prot() 268 protocol, &p, &ad->info); in aa_profile_af_perm()
|
| A D | audit.c | 110 if (ad->info) { in audit_pre() 111 audit_log_format(ab, " info=\"%s\"", ad->info); in audit_pre()
|
| A D | capability.c | 141 ad->info = "optional: no audit"; in profile_capable() 162 ad->info = "optional: no audit"; in profile_capable()
|
| /security/keys/ |
| A D | keyctl_pkey.c | 19 kfree(params->info); in keyctl_pkey_params_free() 42 char *c = params->info, *p, *q; in keyctl_pkey_params_parse() 92 params->info = p; in keyctl_pkey_params_get() 119 struct kernel_pkey_query info; in keyctl_pkey_params_get_2() local 138 if (uparams.in_len > info.max_dec_size || in keyctl_pkey_params_get_2() 139 uparams.out_len > info.max_enc_size) in keyctl_pkey_params_get_2() 143 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2() 144 uparams.out_len > info.max_dec_size) in keyctl_pkey_params_get_2() 148 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2() 149 uparams.out_len > info.max_sig_size) in keyctl_pkey_params_get_2() [all …]
|
| A D | request_key.c | 80 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument 82 struct key *keyring = info->data; in umh_keys_init() 90 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument 92 struct key *keyring = info->data; in umh_keys_cleanup() 102 struct subprocess_info *info; in call_usermodehelper_keys() local 104 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys() 107 if (!info) in call_usermodehelper_keys() 111 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
|
| /security/keys/trusted-keys/ |
| A D | trusted_caam.c | 22 struct caam_blob_info info = { in trusted_caam_seal() local 28 ret = caam_encap_blob(blobifier, &info); in trusted_caam_seal() 32 p->blob_len = info.output_len; in trusted_caam_seal() 39 struct caam_blob_info info = { in trusted_caam_unseal() local 45 ret = caam_decap_blob(blobifier, &info); in trusted_caam_unseal() 49 p->key_len = info.output_len; in trusted_caam_unseal()
|
| /security/integrity/ |
| A D | integrity.h | 208 const char *cause, int result, int info); 212 const char *cause, int result, int info, 225 int result, int info) in integrity_audit_msg() argument 233 int result, int info, int errno) in integrity_audit_message() argument
|
| /security/selinux/ss/ |
| A D | hashtab.c | 108 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument 134 info->slots_used = slots_used; in hashtab_stat() 135 info->max_chain_len = max_chain_len; in hashtab_stat() 136 info->chain2_len_sum = chain2_len_sum; in hashtab_stat()
|
| A D | hashtab.h | 146 void hashtab_stat(struct hashtab *h, struct hashtab_info *info); 148 static inline void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument
|
| A D | policydb.c | 687 struct hashtab_info info; in hash_eval() local 689 hashtab_stat(h, &info); in hash_eval() 693 info.slots_used, h->size, info.max_chain_len, in hash_eval() 694 info.chain2_len_sum); in hash_eval() 2556 if (!info) { in policydb_read() 2569 info->ocon_num); in policydb_read() 2716 rc = ocontext_read(p, info, fp); in policydb_read() 3711 if (!info) { in policydb_write() 3720 buf[2] = cpu_to_le32(info->sym_num); in policydb_write() 3745 num_syms = info->sym_num; in policydb_write() [all …]
|
| /security/apparmor/include/ |
| A D | path.h | 26 const char **name, const char **info,
|
| A D | file.h | 78 const char *info, int error);
|
| /security/integrity/evm/ |
| A D | Kconfig | 28 additional info to the calculation, requires existing EVM 45 additional info to the calculation, requires existing EVM
|