Searched refs:secctx (Results 1 – 11 of 11) sorted by relevance
/Linux-v4.19/net/netlabel/ |
D | netlabel_user.c | 101 char *secctx; in netlbl_audit_start_common() local 117 &secctx, in netlbl_audit_start_common() 119 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 120 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 390 char *secctx = NULL; in netlbl_unlhsh_add() local 455 &secctx, in netlbl_unlhsh_add() 457 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 458 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 489 char *secctx; in netlbl_unlhsh_remove_addr4() local 512 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 513 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 514 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 551 char *secctx; in netlbl_unlhsh_remove_addr6() local 573 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/Linux-v4.19/net/netfilter/ |
D | xt_SECMARK.c | 56 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 59 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 64 info->secctx); in checkentry_lsm() 70 info->secctx); in checkentry_lsm()
|
D | nf_conntrack_standalone.c | 173 char *secctx; in ct_show_secctx() local 175 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 179 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 181 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 334 char *secctx; in ctnetlink_dump_secctx() local 336 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 345 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 351 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/Linux-v4.19/fs/cachefiles/ |
D | security.c | 25 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 33 if (cache->secctx) { in cachefiles_get_security_ID() 34 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 502 char *secctx; in cachefiles_daemon_secctx() local 511 if (cache->secctx) { in cachefiles_daemon_secctx() 516 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 517 if (!secctx) in cachefiles_daemon_secctx() 520 cache->secctx = secctx; in cachefiles_daemon_secctx()
|
D | bind.c | 274 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 92 char *secctx; /* LSM security context */ member
|
/Linux-v4.19/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 20 char secctx[SECMARK_SECCTX_MAX]; member
|
/Linux-v4.19/kernel/ |
D | cred.c | 669 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 674 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|