/kernel/linux/linux-5.10/include/trace/events/ |
D | avc.h | 17 char *scontext, 22 TP_ARGS(sad, scontext, tcontext, tclass), 29 __string(scontext, scontext) 40 __assign_str(scontext, scontext); 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
D | services.c | 83 char **scontext, 89 char **scontext, 93 struct context *scontext, 269 struct context *scontext, in constraint_expr_eval() argument 303 val1 = scontext->user; in constraint_expr_eval() 307 val1 = scontext->type; in constraint_expr_eval() 311 val1 = scontext->role; in constraint_expr_eval() 335 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 339 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 343 l1 = &(scontext->range.level[1]); in constraint_expr_eval() [all …]
|
D | mls.c | 91 char **scontext) in mls_sid_to_context() argument 101 scontextp = *scontext; in mls_sid_to_context() 158 *scontext = scontextp; in mls_sid_to_context() 236 char *scontext, in mls_context_to_sid() argument 278 rangep[0] = scontext; in mls_context_to_sid() 279 rangep[1] = strchr(scontext, '-'); in mls_context_to_sid() 489 struct context *scontext, in mls_compute_sid() argument 507 rtr.source_type = scontext->type; in mls_compute_sid() 522 return mls_context_cpy_low(newcontext, scontext); in mls_compute_sid() 524 return mls_context_cpy_high(newcontext, scontext); in mls_compute_sid() [all …]
|
D | mls.h | 33 char **scontext); 40 char *scontext, 56 struct context *scontext,
|
/kernel/linux/linux-5.10/security/selinux/include/ |
D | security.h | 314 char **scontext, u32 *scontext_len); 317 u32 sid, char **scontext, u32 *scontext_len); 320 u32 sid, char **scontext, u32 *scontext_len); 323 const char *scontext, u32 scontext_len, 327 const char *scontext, u32 *out_sid, gfp_t gfp); 330 const char *scontext, u32 scontext_len, 334 const char *scontext, u32 scontext_len,
|
/kernel/linux/linux-5.10/security/selinux/ |
D | avc.c | 709 char *scontext = NULL; in avc_audit_post_callback() local 716 rc = security_sid_to_context(sad->state, sad->ssid, &scontext, in avc_audit_post_callback() 721 audit_log_format(ab, " scontext=%s", scontext); in avc_audit_post_callback() 736 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback() 738 kfree(scontext); in avc_audit_post_callback() 741 rc = security_sid_to_context_inval(sad->state, sad->ssid, &scontext, in avc_audit_post_callback() 743 if (!rc && scontext) { in avc_audit_post_callback() 744 if (scontext_len && scontext[scontext_len - 1] == '\0') in avc_audit_post_callback() 747 audit_log_n_untrustedstring(ab, scontext, scontext_len); in avc_audit_post_callback() 748 kfree(scontext); in avc_audit_post_callback() [all …]
|
D | hooks.c | 5083 char *scontext; in selinux_socket_getpeersec_stream() local 5095 err = security_sid_to_context(&selinux_state, peer_sid, &scontext, in selinux_socket_getpeersec_stream() 5105 if (copy_to_user(optval, scontext, scontext_len)) in selinux_socket_getpeersec_stream() 5111 kfree(scontext); in selinux_socket_getpeersec_stream()
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/hfi1/ |
D | pio.c | 1875 static void set_threshold(struct hfi1_devdata *dd, int scontext, int i) in set_threshold() argument 1879 thres = min(sc_percent_to_threshold(dd->kernel_send_context[scontext], in set_threshold() 1881 sc_mtu_to_threshold(dd->kernel_send_context[scontext], in set_threshold() 1884 sc_set_cr_threshold(dd->kernel_send_context[scontext], thres); in set_threshold() 1919 int scontext = 1; in pio_map_init() local 1949 int first_scontext = scontext; in pio_map_init() 1967 if (dd->kernel_send_context[scontext]) { in pio_map_init() 1969 dd->kernel_send_context[scontext]; in pio_map_init() 1970 set_threshold(dd, scontext, i); in pio_map_init() 1972 if (++scontext >= first_scontext + in pio_map_init() [all …]
|
/kernel/linux/linux-5.10/tools/perf/Documentation/ |
D | security.txt | 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|