Home
last modified time | relevance | path

Searched refs:secctx (Results 1 – 14 of 14) sorted by relevance

/linux-4.4.14/net/netlabel/
Dnetlabel_user.c96 char *secctx; in netlbl_audit_start_common() local
112 &secctx, in netlbl_audit_start_common()
114 audit_log_format(audit_buf, " subj=%s", secctx); in netlbl_audit_start_common()
115 security_release_secctx(secctx, secctx_len); in netlbl_audit_start_common()
Dnetlabel_unlabeled.c396 char *secctx = NULL; in netlbl_unlhsh_add() local
461 &secctx, in netlbl_unlhsh_add()
463 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_add()
464 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_add()
495 char *secctx; in netlbl_unlhsh_remove_addr4() local
518 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr4()
519 audit_log_format(audit_buf, " sec_obj=%s", secctx); in netlbl_unlhsh_remove_addr4()
520 security_release_secctx(secctx, secctx_len); in netlbl_unlhsh_remove_addr4()
557 char *secctx; in netlbl_unlhsh_remove_addr6() local
579 &secctx, &secctx_len) == 0) { in netlbl_unlhsh_remove_addr6()
[all …]
/linux-4.4.14/net/netfilter/
Dxt_SECMARK.c56 info->secctx[SECMARK_SECCTX_MAX - 1] = '\0'; in checkentry_lsm()
59 err = security_secctx_to_secid(info->secctx, strlen(info->secctx), in checkentry_lsm()
63 pr_info("invalid security context \'%s\'\n", info->secctx); in checkentry_lsm()
68 pr_info("unable to map security context \'%s\'\n", info->secctx); in checkentry_lsm()
Dnf_conntrack_standalone.c127 char *secctx; in ct_show_secctx() local
129 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
133 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx()
135 security_release_secctx(secctx, len); in ct_show_secctx()
Dnf_conntrack_netlink.c323 char *secctx; in ctnetlink_dump_secctx() local
325 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx()
334 if (nla_put_string(skb, CTA_SECCTX_NAME, secctx)) in ctnetlink_dump_secctx()
340 security_release_secctx(secctx, len); in ctnetlink_dump_secctx()
/linux-4.4.14/fs/cachefiles/
Dsecurity.c25 _enter("{%s}", cache->secctx); in cachefiles_get_security_ID()
33 if (cache->secctx) { in cachefiles_get_security_ID()
34 ret = set_security_override_from_ctx(new, cache->secctx); in cachefiles_get_security_ID()
Ddaemon.c501 char *secctx; in cachefiles_daemon_secctx() local
510 if (cache->secctx) { in cachefiles_daemon_secctx()
515 secctx = kstrdup(args, GFP_KERNEL); in cachefiles_daemon_secctx()
516 if (!secctx) in cachefiles_daemon_secctx()
519 cache->secctx = secctx; in cachefiles_daemon_secctx()
Dbind.c273 kfree(cache->secctx); in cachefiles_daemon_unbind()
Dinternal.h89 char *secctx; /* LSM security context */ member
/linux-4.4.14/include/uapi/linux/netfilter/
Dxt_SECMARK.h19 char secctx[SECMARK_SECCTX_MAX]; member
/linux-4.4.14/net/ipv4/netfilter/
Dnf_conntrack_l3proto_ipv4_compat.c101 char *secctx; in ct_show_secctx() local
103 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
107 seq_printf(s, "secctx=%s ", secctx); in ct_show_secctx()
109 security_release_secctx(secctx, len); in ct_show_secctx()
/linux-4.4.14/kernel/
Dcred.c668 int set_security_override_from_ctx(struct cred *new, const char *secctx) in set_security_override_from_ctx() argument
673 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
Daudit.c2035 char *secctx; in audit_log_secctx() local
2037 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx()
2040 audit_log_format(ab, " obj=%s", secctx); in audit_log_secctx()
2041 security_release_secctx(secctx, len); in audit_log_secctx()
/linux-4.4.14/Documentation/DocBook/
Dkernel-api.xml.db563 API-audit-log-secctx