/Linux-v5.4/net/netlabel/ |
D | netlabel_user.c | 87 char *secctx; in netlbl_audit_start_common() local 103 &secctx, in netlbl_audit_start_common() 105 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 106 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 376 char *secctx = NULL; in netlbl_unlhsh_add() local 441 &secctx, in netlbl_unlhsh_add() 443 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 444 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 475 char *secctx; in netlbl_unlhsh_remove_addr4() local 498 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 499 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 500 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 537 char *secctx; in netlbl_unlhsh_remove_addr6() local 559 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/Linux-v5.4/net/netfilter/ |
D | xt_SECMARK.c | 50 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 53 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 58 info->secctx); in checkentry_lsm() 64 info->secctx); in checkentry_lsm()
|
D | nf_conntrack_standalone.c | 177 char *secctx; in ct_show_secctx() local 179 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 183 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 185 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 333 char *secctx; in ctnetlink_dump_secctx() local 335 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 344 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 350 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/Linux-v5.4/fs/cachefiles/ |
D | security.c | 21 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 29 if (cache->secctx) { in cachefiles_get_security_ID() 30 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 498 char *secctx; in cachefiles_daemon_secctx() local 507 if (cache->secctx) { in cachefiles_daemon_secctx() 512 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 513 if (!secctx) in cachefiles_daemon_secctx() 516 cache->secctx = secctx; in cachefiles_daemon_secctx()
|
D | bind.c | 270 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 88 char *secctx; /* LSM security context */ member
|
/Linux-v5.4/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 20 char secctx[SECMARK_SECCTX_MAX]; member
|
/Linux-v5.4/kernel/ |
D | cred.c | 756 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 761 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
/Linux-v5.4/include/uapi/linux/android/ |
D | binder.h | 290 binder_uintptr_t secctx; member
|
/Linux-v5.4/drivers/android/ |
D | binder.c | 2866 char *secctx = NULL; in binder_transaction() local 3115 ret = security_secid_to_secctx(secid, &secctx, &secctx_sz); in binder_transaction() 3149 if (secctx) { in binder_transaction() 3159 secctx, secctx_sz); in binder_transaction() 3164 security_release_secctx(secctx, secctx_sz); in binder_transaction() 3165 secctx = NULL; in binder_transaction() 3497 if (secctx) in binder_transaction() 3498 security_release_secctx(secctx, secctx_sz); in binder_transaction() 4499 tr.secctx = t->security_ctx; in binder_thread_read()
|