/openbmc/linux/security/apparmor/ |
H A D | secid.c | 64 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument 79 if (secdata) in apparmor_secid_to_secctx() 80 len = aa_label_asxprint(secdata, root_ns, label, in apparmor_secid_to_secctx() 93 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument 97 label = aa_label_strn_parse(&root_ns->unconfined->label, secdata, in apparmor_secctx_to_secid() 106 void apparmor_release_secctx(char *secdata, u32 seclen) in apparmor_release_secctx() argument 108 kfree(secdata); in apparmor_release_secctx()
|
/openbmc/linux/security/apparmor/include/ |
H A D | secid.h | 28 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 29 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 30 void apparmor_release_secctx(char *secdata, u32 seclen);
|
/openbmc/linux/include/net/ |
H A D | scm.h | 96 char *secdata; in scm_passec() local 101 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec() 104 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec() 105 security_release_secctx(secdata, seclen); in scm_passec()
|
/openbmc/linux/net/netfilter/ |
H A D | nfnetlink_queue.c | 321 static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) in nfqnl_get_sk_secctx() argument 331 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx() 410 char *secdata = NULL; in nfqnl_build_packet_message() local 485 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message() 625 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message() 654 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message() 663 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message()
|
/openbmc/linux/include/linux/ |
H A D | security.h | 481 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 482 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 483 void security_release_secctx(char *secdata, u32 seclen); 1371 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1376 static inline int security_secctx_to_secid(const char *secdata, in security_secctx_to_secid() argument 1383 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
|
H A D | lsm_hook_defs.h | 271 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata, 273 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid) 274 LSM_HOOK(void, LSM_RET_VOID, release_secctx, char *secdata, u32 seclen)
|
/openbmc/linux/security/ |
H A D | security.c | 3915 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 3925 rc = hp->hook.secid_to_secctx(secid, secdata, seclen); in security_secid_to_secctx() 3944 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument 3947 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid() 3958 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 3960 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
|
/openbmc/linux/net/ipv4/ |
H A D | ip_sockglue.c | 133 char *secdata; in ip_cmsg_recv_security() local 141 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security() 145 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security() 146 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 4738 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument 4742 if (secdata) in smack_secid_to_secctx() 4743 *secdata = skp->smk_known; in smack_secid_to_secctx() 4756 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument 4758 struct smack_known *skp = smk_find_entry(secdata); in smack_secctx_to_secid()
|
/openbmc/linux/security/selinux/ |
H A D | hooks.c | 6514 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument 6517 secdata, seclen); in selinux_secid_to_secctx() 6520 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument 6522 return security_context_to_sid(secdata, seclen, in selinux_secctx_to_secid() 6526 static void selinux_release_secctx(char *secdata, u32 seclen) in selinux_release_secctx() argument 6528 kfree(secdata); in selinux_release_secctx()
|
/openbmc/linux/arch/arm64/boot/dts/qcom/ |
H A D | sdx75.dtsi | 331 secdata_mem: secdata@87f30000 {
|
H A D | sa8775p.dtsi | 364 secdata_apss_mem: secdata-apss@908ff000 {
|
H A D | sm8550.dtsi | 468 /* secdata region can be reused by apps */
|
H A D | sm8450.dtsi | 452 /* secdata region can be reused by apps */
|