Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 10 of 10) sorted by relevance

/security/
Dsecurity.c725 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument
727 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid()
885 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
887 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as()
942 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument
944 *secid = 0; in security_task_getsecid()
945 call_void_hook(task_getsecid, p, secid); in security_task_getsecid()
986 int sig, u32 secid) in security_task_kill() argument
988 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill()
1024 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument
[all …]
/security/selinux/
Dxfrm.c342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
352 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
355 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire()
367 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
Dnetlabel.c123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
Dhooks.c3192 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument
3195 *secid = isec->sid; in selinux_inode_getsecid()
3609 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument
3615 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as()
3620 tsec->sid = secid; in selinux_kernel_act_as()
3710 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument
3712 *secid = task_sid(p); in selinux_task_getsecid()
3761 int sig, u32 secid) in selinux_task_kill() argument
3770 if (secid) in selinux_task_kill()
3771 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill()
[all …]
/security/smack/
Dsmack_lsm.c1533 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument
1537 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid()
2017 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
2020 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as()
2111 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument
2115 *secid = skp->smk_secid; in smack_task_getsecid()
2201 int sig, u32 secid) in smack_task_kill() argument
2214 if (secid == 0) { in smack_task_kill()
2224 skp = smack_from_secid(secid); in smack_task_kill()
3314 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument
[all …]
Dsmack_access.c600 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
606 if (skp->smk_secid == secid) { in smack_from_secid()
Dsmackfs.c199 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
/security/selinux/include/
Dxfrm.h22 struct xfrm_sec_ctx *polsec, u32 secid);
/security/integrity/ima/
Dima.h248 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
/security/selinux/ss/
Dservices.c3347 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3418 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()