| /linux-6.15/include/trace/events/ |
| H A D | avc.h | 17 char *scontext, 22 TP_ARGS(sad, scontext, tcontext, tclass), 29 __string(scontext, scontext) 40 __assign_str(scontext); 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
| /linux-6.15/security/selinux/ss/ |
| H A D | services.c | 86 char **scontext, 397 c = scontext; in constraint_expr_eval() 1060 if (!scontext) { in security_compute_xperms_decision() 1146 if (!scontext) { in security_compute_av() 1201 if (!scontext) { in security_compute_av_user() 1247 if (scontext) in context_struct_to_string() 1253 if (scontext) { in context_struct_to_string() 1267 if (!scontext) in context_struct_to_string() 1346 if (scontext) in security_sid_to_context_core() 1369 if (!scontext) in security_sid_to_context_core() [all …]
|
| H A D | mls.c | 87 char **scontext) in mls_sid_to_context() argument 97 scontextp = *scontext; in mls_sid_to_context() 155 *scontext = scontextp; in mls_sid_to_context() 271 rangep[0] = scontext; in mls_context_to_sid() 272 rangep[1] = strchr(scontext, '-'); in mls_context_to_sid() 495 rtr.source_type = scontext->type; in mls_compute_sid() 510 return mls_context_cpy_low(newcontext, scontext); in mls_compute_sid() 514 return mls_context_cpy(newcontext, scontext); in mls_compute_sid() 522 return mls_context_glblub(newcontext, scontext, in mls_compute_sid() 530 return mls_context_cpy(newcontext, scontext); in mls_compute_sid() [all …]
|
| H A D | mls.h | 29 char **scontext); 34 int mls_context_to_sid(struct policydb *p, char oldc, char *scontext, 45 int mls_compute_sid(struct policydb *p, struct context *scontext,
|
| /linux-6.15/arch/riscv/kvm/ |
| H A D | vcpu_sbi.c | 111 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_supports_sbi_ext() local 182 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_set_sbi_ext_single() local 192 scontext->ext_status[sext->ext_idx] = (reg_val) ? in riscv_vcpu_set_sbi_ext_single() 203 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_get_sbi_ext_single() local 210 *reg_val = scontext->ext_status[sext->ext_idx] == in riscv_vcpu_get_sbi_ext_single() 401 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in kvm_vcpu_sbi_find_ext() local 412 scontext->ext_status[entry->ext_idx] == in kvm_vcpu_sbi_find_ext() 490 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in kvm_riscv_vcpu_sbi_init() local 500 if (idx < 0 || idx >= ARRAY_SIZE(scontext->ext_status)) in kvm_riscv_vcpu_sbi_init() 504 scontext->ext_status[idx] = KVM_RISCV_SBI_EXT_STATUS_UNAVAILABLE; in kvm_riscv_vcpu_sbi_init() [all …]
|
| H A D | vcpu_onereg.c | 1073 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in copy_sbi_reg_indices() local 1076 if (scontext->ext_status[KVM_RISCV_SBI_EXT_STA] == KVM_RISCV_SBI_EXT_STATUS_ENABLED) { in copy_sbi_reg_indices()
|
| /linux-6.15/security/selinux/include/ |
| H A D | security.h | 285 int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len); 287 int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len); 289 int security_sid_to_context_inval(u32 sid, char **scontext, u32 *scontext_len); 291 int security_context_to_sid(const char *scontext, u32 scontext_len, 294 int security_context_str_to_sid(const char *scontext, u32 *out_sid, gfp_t gfp); 296 int security_context_to_sid_default(const char *scontext, u32 scontext_len, 299 int security_context_to_sid_force(const char *scontext, u32 scontext_len,
|
| /linux-6.15/security/selinux/ |
| H A D | avc.c | 696 char *scontext = NULL; in avc_audit_post_callback() local 703 rc = security_sid_to_context(sad->ssid, &scontext, in avc_audit_post_callback() 708 audit_log_format(ab, " scontext=%s", scontext); in avc_audit_post_callback() 723 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback() 725 kfree(scontext); in avc_audit_post_callback() 728 rc = security_sid_to_context_inval(sad->ssid, &scontext, in avc_audit_post_callback() 730 if (!rc && scontext) { in avc_audit_post_callback() 731 if (scontext_len && scontext[scontext_len - 1] == '\0') in avc_audit_post_callback() 735 kfree(scontext); in avc_audit_post_callback() 740 if (!rc && scontext) { in avc_audit_post_callback() [all …]
|
| H A D | hooks.c | 5237 char *scontext = NULL; in selinux_socket_getpeersec_stream() local 5249 err = security_sid_to_context(peer_sid, &scontext, in selinux_socket_getpeersec_stream() 5258 if (copy_to_sockptr(optval, scontext, scontext_len)) in selinux_socket_getpeersec_stream() 5263 kfree(scontext); in selinux_socket_getpeersec_stream()
|
| /linux-6.15/drivers/infiniband/hw/hfi1/ |
| H A D | pio.c | 1833 static void set_threshold(struct hfi1_devdata *dd, int scontext, int i) in set_threshold() argument 1839 sc_mtu_to_threshold(dd->kernel_send_context[scontext], in set_threshold() 1842 sc_set_cr_threshold(dd->kernel_send_context[scontext], thres); in set_threshold() 1877 int scontext = 1; in pio_map_init() local 1905 int first_scontext = scontext; in pio_map_init() 1922 if (dd->kernel_send_context[scontext]) { in pio_map_init() 1924 dd->kernel_send_context[scontext]; in pio_map_init() 1925 set_threshold(dd, scontext, i); in pio_map_init() 1927 if (++scontext >= first_scontext + in pio_map_init() 1930 scontext = first_scontext; in pio_map_init() [all …]
|
| /linux-6.15/tools/perf/Documentation/ |
| H A D | security.txt | 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|