Home
last modified time | relevance | path

Searched refs:secctx (Results 1 – 13 of 13) sorted by relevance

/linux-2.6.39/net/netlabel/
Dnetlabel_user.c101 char *secctx; in netlbl_audit_start_common() local
117 &secctx, in netlbl_audit_start_common()
119 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common()
120 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
Dnetlabel_unlabeled.c436 char *secctx = NULL; in netlbl_unlhsh_add() local
503 &secctx, in netlbl_unlhsh_add()
505 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add()
506 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add()
537 char *secctx; in netlbl_unlhsh_remove_addr4() local
560 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4()
561 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4()
562 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4()
599 char *secctx; in netlbl_unlhsh_remove_addr6() local
621 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6()
[all …]
/linux-2.6.39/net/netfilter/
Dxt_SECMARK.c56 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm()
59 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm()
63 pr_info("invalid security context \'%s\'\n", info->secctx); in checkentry_lsm()
68 pr_info("unable to map security context \'%s\'\n", info->secctx); in checkentry_lsm()
Dnf_conntrack_standalone.c125 char *secctx; in ct_show_secctx() local
127 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
131 ret = seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx()
133 security_release_secctx(secctx, len); in ct_show_secctx()
Dnf_conntrack_netlink.c281 char *secctx; in ctnetlink_dump_secctx() local
283 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx()
292 NLA_PUT_STRING(skb, CTA_SECCTX_NAME, secctx); in ctnetlink_dump_secctx()
297 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
/linux-2.6.39/fs/cachefiles/
Dsecurity.c25 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID()
33 if (cache->secctx) { in cachefiles_get_security_ID()
34 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
Ddaemon.c502 char *secctx; in cachefiles_daemon_secctx() local
511 if (cache->secctx) { in cachefiles_daemon_secctx()
516 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx()
517 if (!secctx) in cachefiles_daemon_secctx()
520 cache->secctx = secctx; in cachefiles_daemon_secctx()
Dbind.c279 kfree(cache->secctx); in cachefiles_daemon_unbind()
Dinternal.h81 char *secctx; /* LSM security context */ member
/linux-2.6.39/include/linux/netfilter/
Dxt_SECMARK.h19 char secctx[SECMARK_SECCTX_MAX]; member
/linux-2.6.39/net/ipv4/netfilter/
Dnf_conntrack_l3proto_ipv4_compat.c99 char *secctx; in ct_show_secctx() local
101 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
105 ret = seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx()
107 security_release_secctx(secctx, len); in ct_show_secctx()
/linux-2.6.39/kernel/
Dcred.c720 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument
725 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
/linux-2.6.39/include/net/
Dxfrm.h687 char *secctx; in xfrm_audit_helper_usrinfo() local
692 security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) { in xfrm_audit_helper_usrinfo()
693 audit_log_format(audit_buf, " subj=%s", secctx); in xfrm_audit_helper_usrinfo()
694 security_release_secctx(secctx, secctx_len); in xfrm_audit_helper_usrinfo()