Home
last modified time | relevance | path

Searched refs:scontext (Results 1 – 9 of 9) sorted by relevance

/linux/include/trace/events/
H A Davc.h17 char *scontext,
22 TP_ARGS(sad, scontext, tcontext, tclass),
29 __string(scontext, scontext)
40 __assign_str(scontext);
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
/linux/arch/riscv/kvm/
H A Dvcpu_sbi.c119 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_supports_sbi_ext() local
124 return sext && scontext->ext_status[sext->ext_idx] != KVM_RISCV_SBI_EXT_STATUS_UNAVAILABLE; in riscv_vcpu_supports_sbi_ext()
222 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_set_sbi_ext_single() local
229 if (!sext || scontext->ext_status[sext->ext_idx] == KVM_RISCV_SBI_EXT_STATUS_UNAVAILABLE) in riscv_vcpu_set_sbi_ext_single()
232 scontext->ext_status[sext->ext_idx] = (reg_val) ? in riscv_vcpu_set_sbi_ext_single()
243 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in riscv_vcpu_get_sbi_ext_single() local
247 if (!sext || scontext->ext_status[sext->ext_idx] == KVM_RISCV_SBI_EXT_STATUS_UNAVAILABLE) in riscv_vcpu_get_sbi_ext_single()
250 *reg_val = scontext->ext_status[sext->ext_idx] == in riscv_vcpu_get_sbi_ext_single()
402 struct kvm_vcpu_sbi_context *scontext = &vcpu->arch.sbi_context; in kvm_riscv_vcpu_reg_indices_sbi() local
414 scontext->ext_status[entry->ext_idx] != KVM_RISCV_SBI_EXT_STATUS_ENABLED) in kvm_riscv_vcpu_reg_indices_sbi()
[all …]
/linux/security/selinux/ss/
H A Dservices.c80 char **scontext,
86 char **scontext,
90 struct context *scontext,
266 struct context *scontext, in constraint_expr_eval() argument
300 val1 = scontext->user; in constraint_expr_eval()
304 val1 = scontext->type; in constraint_expr_eval()
308 val1 = scontext->role; in constraint_expr_eval()
332 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
336 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
340 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
[all …]
H A Dmls.h29 char **scontext);
34 int mls_context_to_sid(struct policydb *p, char oldc, char *scontext,
45 int mls_compute_sid(struct policydb *p, struct context *scontext,
/linux/security/selinux/include/
H A Dsecurity.h292 int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len);
294 int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
296 int security_sid_to_context_inval(u32 sid, char **scontext, u32 *scontext_len);
298 int security_context_to_sid(const char *scontext, u32 scontext_len,
301 int security_context_str_to_sid(const char *scontext, u32 *out_sid, gfp_t gfp);
303 int security_context_to_sid_default(const char *scontext, u32 scontext_len,
306 int security_context_to_sid_force(const char *scontext, u32 scontext_len,
/linux/security/selinux/
H A Davc.c696 char *scontext = NULL; in avc_audit_post_callback() local
703 rc = security_sid_to_context(sad->ssid, &scontext, in avc_audit_post_callback()
708 audit_log_format(ab, " scontext=%s", scontext); in avc_audit_post_callback()
723 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback()
725 kfree(scontext); in avc_audit_post_callback()
728 rc = security_sid_to_context_inval(sad->ssid, &scontext, in avc_audit_post_callback()
730 if (!rc && scontext) { in avc_audit_post_callback()
731 if (scontext_len && scontext[scontext_len - 1] == '\0') in avc_audit_post_callback()
734 audit_log_n_untrustedstring(ab, scontext, scontext_len); in avc_audit_post_callback()
735 kfree(scontext); in avc_audit_post_callback()
[all …]
H A Dhooks.c5365 char *scontext = NULL; in selinux_socket_getpeersec_stream() local
5377 err = security_sid_to_context(peer_sid, &scontext, in selinux_socket_getpeersec_stream()
5386 if (copy_to_sockptr(optval, scontext, scontext_len)) in selinux_socket_getpeersec_stream()
5391 kfree(scontext); in selinux_socket_getpeersec_stream()
/linux/drivers/infiniband/hw/hfi1/
H A Dpio.c1823 static void set_threshold(struct hfi1_devdata *dd, int scontext, int i) in set_threshold() argument
1827 thres = min(sc_percent_to_threshold(dd->kernel_send_context[scontext], in set_threshold()
1829 sc_mtu_to_threshold(dd->kernel_send_context[scontext], in set_threshold()
1832 sc_set_cr_threshold(dd->kernel_send_context[scontext], thres); in set_threshold()
1867 int scontext = 1; in pio_map_init() local
1895 int first_scontext = scontext; in pio_map_init()
1912 if (dd->kernel_send_context[scontext]) { in pio_map_init()
1914 dd->kernel_send_context[scontext]; in pio_map_init()
1915 set_threshold(dd, scontext, i); in pio_map_init()
1917 if (++scontext >= first_scontext + in pio_map_init()
[all …]
/linux/tools/perf/Documentation/
H A Dsecurity.txt163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…