/linux-4.4.14/net/netlabel/ |
D | netlabel_user.c | 96 char *secctx; in netlbl_audit_start_common() local 112 &secctx, in netlbl_audit_start_common() 114 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common() 115 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
|
D | netlabel_unlabeled.c | 396 char *secctx = NULL; in netlbl_unlhsh_add() local 461 &secctx, in netlbl_unlhsh_add() 463 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add() 464 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add() 495 char *secctx; in netlbl_unlhsh_remove_addr4() local 518 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4() 519 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4() 520 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4() 557 char *secctx; in netlbl_unlhsh_remove_addr6() local 579 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6() [all …]
|
/linux-4.4.14/net/netfilter/ |
D | xt_SECMARK.c | 56 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm() 59 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm() 63 pr_info("invalid security context \'%s\'\n", info->secctx); in checkentry_lsm() 68 pr_info("unable to map security context \'%s\'\n", info->secctx); in checkentry_lsm()
|
D | nf_conntrack_standalone.c | 127 char *secctx; in ct_show_secctx() local 129 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 133 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 135 security_release_secctx(secctx, len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 323 char *secctx; in ctnetlink_dump_secctx() local 325 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 334 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx() 340 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
|
/linux-4.4.14/fs/cachefiles/ |
D | security.c | 25 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID() 33 if (cache->secctx) { in cachefiles_get_security_ID() 34 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
|
D | daemon.c | 501 char *secctx; in cachefiles_daemon_secctx() local 510 if (cache->secctx) { in cachefiles_daemon_secctx() 515 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx() 516 if (!secctx) in cachefiles_daemon_secctx() 519 cache->secctx = secctx; in cachefiles_daemon_secctx()
|
D | bind.c | 273 kfree(cache->secctx); in cachefiles_daemon_unbind()
|
D | internal.h | 89 char *secctx; /* LSM security context */ member
|
/linux-4.4.14/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 19 char secctx[SECMARK_SECCTX_MAX]; member
|
/linux-4.4.14/net/ipv4/netfilter/ |
D | nf_conntrack_l3proto_ipv4_compat.c | 101 char *secctx; in ct_show_secctx() local 103 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx() 107 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx() 109 security_release_secctx(secctx, len); in ct_show_secctx()
|
/linux-4.4.14/kernel/ |
D | cred.c | 668 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument 673 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
|
D | audit.c | 2035 char *secctx; in audit_log_secctx() local 2037 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx() 2040 audit_log_format(ab, " obj=%s", secctx); in audit_log_secctx() 2041 security_release_secctx(secctx, len); in audit_log_secctx()
|
/linux-4.4.14/Documentation/DocBook/ |
D | kernel-api.xml.db | 563 API-audit-log-secctx
|