/linux-2.6.39/net/netlabel/ |
D | netlabel_user.c | 101 char *secctx; in netlbl_audit_start_common() local 117 &secctx, in netlbl_audit_start_common() 119 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 120 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 436 char *secctx = NULL; in netlbl_unlhsh_add() local 503 &secctx, in netlbl_unlhsh_add() 505 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 506 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 537 char *secctx; in netlbl_unlhsh_remove_addr4() local 560 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 561 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 562 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 599 char *secctx; in netlbl_unlhsh_remove_addr6() local 621 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/linux-2.6.39/net/netfilter/ |
D | xt_SECMARK.c | 56 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 59 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 63 pr_info("invalid security context \'%s\'\n", info->secctx); in checkentry_lsm() 68 pr_info("unable to map security context \'%s\'\n", info->secctx); in checkentry_lsm()
|
D | nf_conntrack_standalone.c | 125 char *secctx; in ct_show_secctx() local 127 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 131 ret = seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 133 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 281 char *secctx; in ctnetlink_dump_secctx() local 283 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 292 NLA_PUT_STRING(skb, CTA_SECCTX_NAME, secctx); in ctnetlink_dump_secctx() 297 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/linux-2.6.39/fs/cachefiles/ |
D | security.c | 25 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 33 if (cache->secctx) { in cachefiles_get_security_ID() 34 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 502 char *secctx; in cachefiles_daemon_secctx() local 511 if (cache->secctx) { in cachefiles_daemon_secctx() 516 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 517 if (!secctx) in cachefiles_daemon_secctx() 520 cache->secctx = secctx; in cachefiles_daemon_secctx()
|
D | bind.c | 279 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 81 char *secctx; /* LSM security context */ member
|
/linux-2.6.39/include/linux/netfilter/ |
D | xt_SECMARK.h | 19 char secctx[SECMARK_SECCTX_MAX]; member
|
/linux-2.6.39/net/ipv4/netfilter/ |
D | nf_conntrack_l3proto_ipv4_compat.c | 99 char *secctx; in ct_show_secctx() local 101 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 105 ret = seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 107 security_release_secctx(secctx, len); in ct_show_secctx()
|
/linux-2.6.39/kernel/ |
D | cred.c | 720 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 725 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
/linux-2.6.39/include/net/ |
D | xfrm.h | 687 char *secctx; in xfrm_audit_helper_usrinfo() local 692 security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) { in xfrm_audit_helper_usrinfo() 693 audit_log_format(audit_buf, " subj=%s", secctx); in xfrm_audit_helper_usrinfo() 694 security_release_secctx(secctx, secctx_len); in xfrm_audit_helper_usrinfo()
|