Searched refs:secid (Results 1 – 10 of 10) sorted by relevance
/security/ |
D | security.c | 725 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument 727 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid() 885 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument 887 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as() 942 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument 944 *secid = 0; in security_task_getsecid() 945 call_void_hook(task_getsecid, p, secid); in security_task_getsecid() 986 int sig, u32 secid) in security_task_kill() argument 988 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill() 1024 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument [all …]
|
/security/selinux/ |
D | xfrm.c | 342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 352 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 355 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire() 367 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
D | netlabel.c | 123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
D | hooks.c | 3192 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument 3195 *secid = isec->sid; in selinux_inode_getsecid() 3609 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument 3615 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as() 3620 tsec->sid = secid; in selinux_kernel_act_as() 3710 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument 3712 *secid = task_sid(p); in selinux_task_getsecid() 3761 int sig, u32 secid) in selinux_task_kill() argument 3770 if (secid) in selinux_task_kill() 3771 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill() [all …]
|
/security/smack/ |
D | smack_lsm.c | 1533 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument 1537 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid() 2017 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 2020 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as() 2111 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument 2115 *secid = skp->smk_secid; in smack_task_getsecid() 2201 int sig, u32 secid) in smack_task_kill() argument 2214 if (secid == 0) { in smack_task_kill() 2224 skp = smack_from_secid(secid); in smack_task_kill() 3314 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument [all …]
|
D | smack_access.c | 600 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 606 if (skp->smk_secid == secid) { in smack_from_secid()
|
D | smackfs.c | 199 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
|
/security/selinux/include/ |
D | xfrm.h | 22 struct xfrm_sec_ctx *polsec, u32 secid);
|
/security/integrity/ima/ |
D | ima.h | 248 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
/security/selinux/ss/ |
D | services.c | 3347 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3418 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|