/Linux-v5.10/net/netlabel/ |
D | netlabel_user.c | 87 char *secctx; in netlbl_audit_start_common() local 103 &secctx, in netlbl_audit_start_common() 105 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 106 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 377 char *secctx = NULL; in netlbl_unlhsh_add() local 442 &secctx, in netlbl_unlhsh_add() 444 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 445 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 476 char *secctx; in netlbl_unlhsh_remove_addr4() local 499 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 500 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 501 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 538 char *secctx; in netlbl_unlhsh_remove_addr6() local 560 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/Linux-v5.10/net/netfilter/ |
D | xt_SECMARK.c | 48 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 51 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 56 info->secctx); in checkentry_lsm() 62 info->secctx); in checkentry_lsm()
|
D | nf_conntrack_standalone.c | 177 char *secctx; in ct_show_secctx() local 179 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 183 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 185 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 335 char *secctx; in ctnetlink_dump_secctx() local 337 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 346 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 352 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/Linux-v5.10/fs/cachefiles/ |
D | security.c | 21 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 29 if (cache->secctx) { in cachefiles_get_security_ID() 30 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 498 char *secctx; in cachefiles_daemon_secctx() local 507 if (cache->secctx) { in cachefiles_daemon_secctx() 512 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 513 if (!secctx) in cachefiles_daemon_secctx() 516 cache->secctx = secctx; in cachefiles_daemon_secctx()
|
D | bind.c | 270 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 88 char *secctx; /* LSM security context */ member
|
/Linux-v5.10/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 20 char secctx[SECMARK_SECCTX_MAX]; member
|
/Linux-v5.10/kernel/ |
D | cred.c | 757 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 762 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
/Linux-v5.10/include/uapi/linux/android/ |
D | binder.h | 290 binder_uintptr_t secctx; member
|
/Linux-v5.10/drivers/android/ |
D | binder.c | 2839 char *secctx = NULL; in binder_transaction() local 3094 ret = security_secid_to_secctx(secid, &secctx, &secctx_sz); in binder_transaction() 3128 if (secctx) { in binder_transaction() 3138 secctx, secctx_sz); in binder_transaction() 3143 security_release_secctx(secctx, secctx_sz); in binder_transaction() 3144 secctx = NULL; in binder_transaction() 3476 if (secctx) in binder_transaction() 3477 security_release_secctx(secctx, secctx_sz); in binder_transaction() 4485 tr.secctx = t->security_ctx; in binder_thread_read()
|