/Linux-v4.19/security/apparmor/ |
D | secid.c | 76 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument 87 if (secdata) in apparmor_secid_to_secctx() 88 len = aa_label_asxprint(secdata, root_ns, label, in apparmor_secid_to_secctx() 104 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument 108 label = aa_label_strn_parse(&root_ns->unconfined->label, secdata, in apparmor_secctx_to_secid() 117 void apparmor_release_secctx(char *secdata, u32 seclen) in apparmor_release_secctx() argument 119 kfree(secdata); in apparmor_release_secctx()
|
/Linux-v4.19/security/apparmor/include/ |
D | secid.h | 26 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 27 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 28 void apparmor_release_secctx(char *secdata, u32 seclen);
|
/Linux-v4.19/fs/kernfs/ |
D | inode.c | 138 static int kernfs_node_setsecdata(struct kernfs_iattrs *attrs, void **secdata, in kernfs_node_setsecdata() argument 147 attrs->ia_secdata = *secdata; in kernfs_node_setsecdata() 150 *secdata = old_secdata; in kernfs_node_setsecdata() 352 void *secdata; in kernfs_security_xattr_set() local 363 error = security_inode_getsecctx(inode, &secdata, &secdata_len); in kernfs_security_xattr_set() 368 error = kernfs_node_setsecdata(attrs, &secdata, &secdata_len); in kernfs_security_xattr_set() 371 if (secdata) in kernfs_security_xattr_set() 372 security_release_secctx(secdata, secdata_len); in kernfs_security_xattr_set()
|
/Linux-v4.19/include/net/ |
D | scm.h | 95 char *secdata; in scm_passec() local 100 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec() 103 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec() 104 security_release_secctx(secdata, seclen); in scm_passec()
|
/Linux-v4.19/include/linux/ |
D | security.h | 397 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 398 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 399 void security_release_secctx(char *secdata, u32 seclen); 1165 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1170 static inline int security_secctx_to_secid(const char *secdata, in security_secctx_to_secid() argument 1177 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 1830 static inline void free_secdata(void *secdata) in free_secdata() argument 1832 free_page((unsigned long)secdata); in free_secdata() 1842 static inline void free_secdata(void *secdata) in free_secdata() argument
|
D | lsm_hooks.h | 1652 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen); 1653 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid); 1654 void (*release_secctx)(char *secdata, u32 seclen);
|
/Linux-v4.19/fs/ |
D | super.c | 1248 char *secdata = NULL; in mount_fs() local 1252 secdata = alloc_secdata(); in mount_fs() 1253 if (!secdata) in mount_fs() 1256 error = security_sb_copy_data(data, secdata); in mount_fs() 1279 error = security_sb_kern_mount(sb, flags, secdata); in mount_fs() 1293 free_secdata(secdata); in mount_fs() 1299 free_secdata(secdata); in mount_fs()
|
/Linux-v4.19/net/netfilter/ |
D | nfnetlink_queue.c | 308 static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) in nfqnl_get_sk_secctx() argument 318 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx() 398 char *secdata = NULL; in nfqnl_build_packet_message() local 465 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message() 600 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message() 629 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message() 638 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message()
|
/Linux-v4.19/security/ |
D | security.c | 1312 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1314 return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata, in security_secid_to_secctx() 1319 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument 1322 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid() 1326 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 1328 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
|
/Linux-v4.19/fs/btrfs/ |
D | super.c | 1464 char *secdata = NULL; in parse_security_options() local 1467 secdata = alloc_secdata(); in parse_security_options() 1468 if (!secdata) in parse_security_options() 1470 ret = security_sb_copy_data(orig_opts, secdata); in parse_security_options() 1472 free_secdata(secdata); in parse_security_options() 1475 ret = security_sb_parse_opts_str(secdata, sec_opts); in parse_security_options() 1476 free_secdata(secdata); in parse_security_options()
|
/Linux-v4.19/fs/nfs/ |
D | super.c | 1209 char *p, *string, *secdata; in nfs_parse_mount_options() local 1220 secdata = alloc_secdata(); in nfs_parse_mount_options() 1221 if (!secdata) in nfs_parse_mount_options() 1224 rc = security_sb_copy_data(raw, secdata); in nfs_parse_mount_options() 1228 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts); in nfs_parse_mount_options() 1232 free_secdata(secdata); in nfs_parse_mount_options() 1685 free_secdata(secdata); in nfs_parse_mount_options()
|
/Linux-v4.19/net/ipv4/ |
D | ip_sockglue.c | 133 char *secdata; in ip_cmsg_recv_security() local 141 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security() 145 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security() 146 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
|
/Linux-v4.19/security/selinux/ |
D | hooks.c | 2840 char *secdata, **mount_options; in selinux_sb_remount() local 2853 secdata = alloc_secdata(); in selinux_sb_remount() 2854 if (!secdata) in selinux_sb_remount() 2856 rc = selinux_sb_copy_data(data, secdata); in selinux_sb_remount() 2860 rc = selinux_parse_opts_str(secdata, &opts); in selinux_sb_remount() 2912 free_secdata(secdata); in selinux_sb_remount() 6570 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument 6573 secdata, seclen); in selinux_secid_to_secctx() 6576 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument 6578 return security_context_to_sid(&selinux_state, secdata, seclen, in selinux_secctx_to_secid() [all …]
|
/Linux-v4.19/security/smack/ |
D | smack_lsm.c | 4526 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument 4530 if (secdata) in smack_secid_to_secctx() 4531 *secdata = skp->smk_known; in smack_secid_to_secctx() 4544 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument 4546 struct smack_known *skp = smk_find_entry(secdata); in smack_secctx_to_secid()
|