/linux-6.1.9/net/netfilter/ |
D | xt_SECMARK.c | 47 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 50 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 55 info->secctx); in checkentry_lsm() 61 info->secctx); in checkentry_lsm() 126 memcpy(newinfo.secctx, info->secctx, SECMARK_SECCTX_MAX); in secmark_tg_check_v0()
|
D | nf_conntrack_standalone.c | 180 char *secctx; in ct_show_secctx() local 182 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 186 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 188 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 354 char *secctx; in ctnetlink_dump_secctx() local 356 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 365 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 371 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/linux-6.1.9/net/netlabel/ |
D | netlabel_user.c | 87 char *secctx; in netlbl_audit_start_common() local 103 &secctx, in netlbl_audit_start_common() 105 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 106 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 377 char *secctx = NULL; in netlbl_unlhsh_add() local 442 &secctx, in netlbl_unlhsh_add() 444 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 445 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 476 char *secctx; in netlbl_unlhsh_remove_addr4() local 498 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 499 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 500 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 537 char *secctx; in netlbl_unlhsh_remove_addr6() local 558 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/linux-6.1.9/fs/cachefiles/ |
D | security.c | 21 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 29 if (cache->secctx) { in cachefiles_get_security_ID() 30 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 567 char *secctx; in cachefiles_daemon_secctx() local 576 if (cache->secctx) { in cachefiles_daemon_secctx() 581 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 582 if (!secctx) in cachefiles_daemon_secctx() 585 cache->secctx = secctx; in cachefiles_daemon_secctx() 810 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 110 char *secctx; /* LSM security context */ member
|
/linux-6.1.9/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 20 char secctx[SECMARK_SECCTX_MAX]; member 25 char secctx[SECMARK_SECCTX_MAX]; member
|
/linux-6.1.9/kernel/ |
D | cred.c | 791 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 796 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
/linux-6.1.9/include/uapi/linux/android/ |
D | binder.h | 330 binder_uintptr_t secctx; member
|
/linux-6.1.9/drivers/android/ |
D | binder.c | 2899 char *secctx = NULL; in binder_transaction() local 3176 ret = security_secid_to_secctx(secid, &secctx, &secctx_sz); in binder_transaction() 3219 if (secctx) { in binder_transaction() 3229 secctx, secctx_sz); in binder_transaction() 3234 security_release_secctx(secctx, secctx_sz); in binder_transaction() 3235 secctx = NULL; in binder_transaction() 3650 if (secctx) in binder_transaction() 3651 security_release_secctx(secctx, secctx_sz); in binder_transaction() 4668 tr.secctx = t->security_ctx; in binder_thread_read()
|