Home
last modified time | relevance | path

Searched refs:secdata (Results 1 – 12 of 12) sorted by relevance

/linux-4.4.14/fs/kernfs/
Dinode.c138 static int kernfs_node_setsecdata(struct kernfs_node *kn, void **secdata, in kernfs_node_setsecdata() argument
152 attrs->ia_secdata = *secdata; in kernfs_node_setsecdata()
155 *secdata = old_secdata; in kernfs_node_setsecdata()
165 void *secdata; in kernfs_iop_setxattr() local
180 &secdata, &secdata_len); in kernfs_iop_setxattr()
185 error = kernfs_node_setsecdata(kn, &secdata, &secdata_len); in kernfs_iop_setxattr()
188 if (secdata) in kernfs_iop_setxattr()
189 security_release_secctx(secdata, secdata_len); in kernfs_iop_setxattr()
/linux-4.4.14/include/net/
Dscm.h92 char *secdata; in scm_passec() local
97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
100 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec()
101 security_release_secctx(secdata, seclen); in scm_passec()
/linux-4.4.14/include/linux/
Dsecurity.h352 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
353 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
354 void security_release_secctx(char *secdata, u32 seclen);
1080 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument
1085 static inline int security_secctx_to_secid(const char *secdata, in security_secctx_to_secid() argument
1092 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
1624 static inline void free_secdata(void *secdata) in free_secdata() argument
1626 free_page((unsigned long)secdata); in free_secdata()
1636 static inline void free_secdata(void *secdata) in free_secdata() argument
Dlsm_hooks.h1515 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
1516 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
1517 void (*release_secctx)(char *secdata, u32 seclen);
/linux-4.4.14/fs/
Dsuper.c1111 char *secdata = NULL; in mount_fs() local
1115 secdata = alloc_secdata(); in mount_fs()
1116 if (!secdata) in mount_fs()
1119 error = security_sb_copy_data(data, secdata); in mount_fs()
1134 error = security_sb_kern_mount(sb, flags, secdata); in mount_fs()
1148 free_secdata(secdata); in mount_fs()
1154 free_secdata(secdata); in mount_fs()
/linux-4.4.14/net/netfilter/
Dnfnetlink_queue.c281 static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) in nfqnl_get_sk_secctx() argument
291 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx()
318 char *secdata = NULL; in nfqnl_build_packet_message() local
384 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message()
517 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message()
/linux-4.4.14/fs/btrfs/
Dsuper.c1378 char *secdata = NULL; in parse_security_options() local
1381 secdata = alloc_secdata(); in parse_security_options()
1382 if (!secdata) in parse_security_options()
1384 ret = security_sb_copy_data(orig_opts, secdata); in parse_security_options()
1386 free_secdata(secdata); in parse_security_options()
1389 ret = security_sb_parse_opts_str(secdata, sec_opts); in parse_security_options()
1390 free_secdata(secdata); in parse_security_options()
/linux-4.4.14/security/
Dsecurity.c1144 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument
1146 return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata, in security_secid_to_secctx()
1151 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument
1154 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid()
1158 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
1160 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
/linux-4.4.14/fs/nfs/
Dsuper.c1199 char *p, *string, *secdata; in nfs_parse_mount_options() local
1210 secdata = alloc_secdata(); in nfs_parse_mount_options()
1211 if (!secdata) in nfs_parse_mount_options()
1214 rc = security_sb_copy_data(raw, secdata); in nfs_parse_mount_options()
1218 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts); in nfs_parse_mount_options()
1222 free_secdata(secdata); in nfs_parse_mount_options()
1668 free_secdata(secdata); in nfs_parse_mount_options()
/linux-4.4.14/net/ipv4/
Dip_sockglue.c116 char *secdata; in ip_cmsg_recv_security() local
124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
128 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security()
129 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
/linux-4.4.14/security/selinux/
Dhooks.c2591 char *secdata, **mount_options; in selinux_sb_remount() local
2604 secdata = alloc_secdata(); in selinux_sb_remount()
2605 if (!secdata) in selinux_sb_remount()
2607 rc = selinux_sb_copy_data(data, secdata); in selinux_sb_remount()
2611 rc = selinux_parse_opts_str(secdata, &opts); in selinux_sb_remount()
2661 free_secdata(secdata); in selinux_sb_remount()
5750 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument
5752 return security_sid_to_context(secid, secdata, seclen); in selinux_secid_to_secctx()
5755 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument
5757 return security_context_to_sid(secdata, seclen, secid, GFP_KERNEL); in selinux_secctx_to_secid()
[all …]
/linux-4.4.14/security/smack/
Dsmack_lsm.c4517 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument
4521 if (secdata) in smack_secid_to_secctx()
4522 *secdata = skp->smk_known; in smack_secid_to_secctx()
4535 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument
4537 struct smack_known *skp = smk_find_entry(secdata); in smack_secctx_to_secid()
4553 static void smack_release_secctx(char *secdata, u32 seclen) in smack_release_secctx() argument