Home
last modified time | relevance | path

Searched refs:scontext (Results 1 – 9 of 9) sorted by relevance

/linux-5.19.10/include/trace/events/
Davc.h17 char *scontext,
22 TP_ARGS(sad, scontext, tcontext, tclass),
29 __string(scontext, scontext)
40 __assign_str(scontext, scontext);
46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
/linux-5.19.10/security/selinux/ss/
Dservices.c85 char **scontext,
91 char **scontext,
95 struct context *scontext,
271 struct context *scontext, in constraint_expr_eval() argument
305 val1 = scontext->user; in constraint_expr_eval()
309 val1 = scontext->type; in constraint_expr_eval()
313 val1 = scontext->role; in constraint_expr_eval()
337 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
341 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
345 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
[all …]
Dmls.c91 char **scontext) in mls_sid_to_context() argument
101 scontextp = *scontext; in mls_sid_to_context()
158 *scontext = scontextp; in mls_sid_to_context()
235 char *scontext, in mls_context_to_sid() argument
277 rangep[0] = scontext; in mls_context_to_sid()
278 rangep[1] = strchr(scontext, '-'); in mls_context_to_sid()
488 struct context *scontext, in mls_compute_sid() argument
506 rtr.source_type = scontext->type; in mls_compute_sid()
521 return mls_context_cpy_low(newcontext, scontext); in mls_compute_sid()
523 return mls_context_cpy_high(newcontext, scontext); in mls_compute_sid()
[all …]
Dmls.h33 char **scontext);
40 char *scontext,
56 struct context *scontext,
/linux-5.19.10/security/selinux/include/
Dsecurity.h319 char **scontext, u32 *scontext_len);
322 u32 sid, char **scontext, u32 *scontext_len);
325 u32 sid, char **scontext, u32 *scontext_len);
328 const char *scontext, u32 scontext_len,
332 const char *scontext, u32 *out_sid, gfp_t gfp);
335 const char *scontext, u32 scontext_len,
339 const char *scontext, u32 scontext_len,
/linux-5.19.10/security/selinux/
Davc.c711 char *scontext = NULL; in avc_audit_post_callback() local
718 rc = security_sid_to_context(sad->state, sad->ssid, &scontext, in avc_audit_post_callback()
723 audit_log_format(ab, " scontext=%s", scontext); in avc_audit_post_callback()
738 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback()
740 kfree(scontext); in avc_audit_post_callback()
743 rc = security_sid_to_context_inval(sad->state, sad->ssid, &scontext, in avc_audit_post_callback()
745 if (!rc && scontext) { in avc_audit_post_callback()
746 if (scontext_len && scontext[scontext_len - 1] == '\0') in avc_audit_post_callback()
749 audit_log_n_untrustedstring(ab, scontext, scontext_len); in avc_audit_post_callback()
750 kfree(scontext); in avc_audit_post_callback()
[all …]
Dhooks.c5121 char *scontext; in selinux_socket_getpeersec_stream() local
5133 err = security_sid_to_context(&selinux_state, peer_sid, &scontext, in selinux_socket_getpeersec_stream()
5143 if (copy_to_user(optval, scontext, scontext_len)) in selinux_socket_getpeersec_stream()
5149 kfree(scontext); in selinux_socket_getpeersec_stream()
/linux-5.19.10/drivers/infiniband/hw/hfi1/
Dpio.c1834 static void set_threshold(struct hfi1_devdata *dd, int scontext, int i) in set_threshold() argument
1838 thres = min(sc_percent_to_threshold(dd->kernel_send_context[scontext], in set_threshold()
1840 sc_mtu_to_threshold(dd->kernel_send_context[scontext], in set_threshold()
1843 sc_set_cr_threshold(dd->kernel_send_context[scontext], thres); in set_threshold()
1878 int scontext = 1; in pio_map_init() local
1908 int first_scontext = scontext; in pio_map_init()
1926 if (dd->kernel_send_context[scontext]) { in pio_map_init()
1928 dd->kernel_send_context[scontext]; in pio_map_init()
1929 set_threshold(dd, scontext, i); in pio_map_init()
1931 if (++scontext >= first_scontext + in pio_map_init()
[all …]
/linux-5.19.10/tools/perf/Documentation/
Dsecurity.txt163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…