/openbmc/linux/net/netlabel/ |
H A D | netlabel_user.c | 87 char *secctx; in netlbl_audit_start_common() local 103 &secctx, in netlbl_audit_start_common() 105 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 106 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
H A D | netlabel_unlabeled.c | 377 char *secctx = NULL; in netlbl_unlhsh_add() local 442 &secctx, in netlbl_unlhsh_add() 445 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 476 char *secctx; in netlbl_unlhsh_remove_addr4() local 498 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 500 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 537 char *secctx; in netlbl_unlhsh_remove_addr6() local 558 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() 1074 char *secctx; in netlbl_unlabel_staticlist_gen() local 1136 secctx); in netlbl_unlabel_staticlist_gen() [all …]
|
/openbmc/linux/net/netfilter/ |
H A D | xt_SECMARK.c | 47 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 50 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 55 info->secctx); in checkentry_lsm() 61 info->secctx); in checkentry_lsm() 126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0()
|
H A D | nf_conntrack_standalone.c | 177 char *secctx; in ct_show_secctx() local 179 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 183 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 185 security_release_secctx(secctx, len); in ct_show_secctx()
|
H A D | nf_conntrack_netlink.c | 360 char *secctx; in ctnetlink_dump_secctx() local 362 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 371 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 377 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/openbmc/linux/fs/cachefiles/ |
H A D | security.c | 21 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 29 if (cache->secctx) { in cachefiles_get_security_ID() 30 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
H A D | daemon.c | 579 char *secctx; in cachefiles_daemon_secctx() local 588 if (cache->secctx) { in cachefiles_daemon_secctx() 593 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 594 if (!secctx) in cachefiles_daemon_secctx() 597 cache->secctx = secctx; in cachefiles_daemon_secctx() 823 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
H A D | internal.h | 125 char *secctx; /* LSM security context */ member
|
/openbmc/linux/include/uapi/linux/netfilter/ |
H A D | xt_SECMARK.h | 20 char secctx[SECMARK_SECCTX_MAX]; member 25 char secctx[SECMARK_SECCTX_MAX]; member
|
/openbmc/linux/kernel/ |
H A D | cred.c | 701 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 706 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
/openbmc/linux/include/uapi/linux/android/ |
H A D | binder.h | 330 binder_uintptr_t secctx; member
|
/openbmc/linux/drivers/android/ |
H A D | binder.c | 2933 char *secctx = NULL; in binder_transaction() local 3213 ret = security_secid_to_secctx(secid, &secctx, &secctx_sz); in binder_transaction() 3256 if (secctx) { in binder_transaction() 3266 secctx, secctx_sz); in binder_transaction() 3271 security_release_secctx(secctx, secctx_sz); in binder_transaction() 3272 secctx = NULL; in binder_transaction() 3696 if (secctx) in binder_transaction() 3697 security_release_secctx(secctx, secctx_sz); in binder_transaction() 4717 tr.secctx = t->security_ctx; in binder_thread_read()
|