Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 22 of 22) sorted by relevance

/security/apparmor/
Dsecid.c46 void aa_secid_update(u32 secid, struct aa_label *label) in aa_secid_update() argument
51 idr_replace(&aa_secids, label, secid); in aa_secid_update()
59 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() argument
64 label = idr_find(&aa_secids, secid); in aa_secid_to_label()
70 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument
73 struct aa_label *label = aa_secid_to_label(secid); in apparmor_secid_to_secctx()
98 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument
106 *secid = label->secid; in apparmor_secctx_to_secid()
136 label->secid = AA_SECID_INVALID; in aa_alloc_secid()
141 label->secid = ret; in aa_alloc_secid()
[all …]
Dnet.c195 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
206 secmark->secid = label->secid; in apparmor_secmark_init()
211 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument
221 if (!profile->secmark[i].secid) { in aa_secmark_perm()
227 if (profile->secmark[i].secid == secid || in aa_secmark_perm()
228 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
245 u32 secid, struct sock *sk) in apparmor_secmark_check() argument
251 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
DMakefile8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o
Dlsm.c709 static void apparmor_task_getsecid(struct task_struct *p, u32 *secid) in apparmor_task_getsecid() argument
712 *secid = label->secid; in apparmor_task_getsecid()
1105 struct sk_buff *skb, u32 *secid) in apparmor_socket_getpeersec_dgram() argument
Dlabel.c334 aa_free_secid(label->secid); in label_destroy()
/security/integrity/ima/
Dima_main.c193 u32 secid, char *buf, loff_t size, int mask, in process_measurement() argument
217 action = ima_get_action(inode, cred, secid, mask, func, &pcr, in process_measurement()
383 u32 secid; in ima_file_mmap() local
386 security_task_getsecid(current, &secid); in ima_file_mmap()
387 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap()
410 u32 secid; in ima_bprm_check() local
412 security_task_getsecid(current, &secid); in ima_bprm_check()
413 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check()
418 security_cred_getsecid(bprm->cred, &secid); in ima_bprm_check()
419 return process_measurement(bprm->file, bprm->cred, secid, NULL, 0, in ima_bprm_check()
[all …]
Dima.h208 int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid,
232 int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid,
373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
Dima_appraise.c50 u32 secid; in ima_must_appraise() local
55 security_task_getsecid(current, &secid); in ima_must_appraise()
56 return ima_match_policy(inode, current_cred(), secid, func, mask, in ima_must_appraise()
Dima_api.c184 int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid, in ima_get_action() argument
192 return ima_match_policy(inode, cred, secid, func, mask, flags, pcr, in ima_get_action()
Dima_policy.c371 const struct cred *cred, u32 secid, in ima_match_rules() argument
434 rc = security_filter_rule_match(secid, in ima_match_rules()
490 int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid, in ima_match_policy() argument
506 if (!ima_match_rules(entry, inode, cred, secid, func, mask)) in ima_match_policy()
/security/apparmor/include/
Dsecid.h24 struct aa_label *aa_secid_to_label(u32 secid);
25 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
26 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
31 void aa_free_secid(u32 secid);
32 void aa_secid_update(u32 secid, struct aa_label *label);
Dnet.h85 u32 secid; member
110 u32 secid, struct sock *sk);
Dlabel.h132 u32 secid; member
/security/
Dsecurity.c1349 void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() argument
1351 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid()
1571 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument
1573 *secid = 0; in security_cred_getsecid()
1574 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid()
1578 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
1580 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as()
1653 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument
1655 *secid = 0; in security_task_getsecid()
1656 call_void_hook(task_getsecid, p, secid); in security_task_getsecid()
[all …]
/security/selinux/
Dxfrm.c344 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
354 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
357 rc = security_sid_to_context(&selinux_state, secid, &ctx_str, in selinux_xfrm_state_alloc_acquire()
370 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
Dnetlabel.c110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
286 ep->secid, &secattr); in selinux_netlbl_sctp_assoc_request()
333 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, in selinux_netlbl_inet_conn_request()
Dhooks.c3410 static void selinux_inode_getsecid(struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument
3413 *secid = isec->sid; in selinux_inode_getsecid()
3908 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() argument
3910 *secid = cred_sid(c); in selinux_cred_getsecid()
3917 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument
3924 sid, secid, in selinux_kernel_act_as()
3929 tsec->sid = secid; in selinux_kernel_act_as()
4055 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument
4057 *secid = task_sid(p); in selinux_task_getsecid()
4138 u32 secid; in selinux_task_kill() local
[all …]
/security/smack/
Dsmack_lsm.c1502 static void smack_inode_getsecid(struct inode *inode, u32 *secid) in smack_inode_getsecid() argument
1506 *secid = skp->smk_secid; in smack_inode_getsecid()
1991 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument
1997 *secid = skp->smk_secid; in smack_cred_getsecid()
2008 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
2012 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as()
2098 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument
2102 *secid = skp->smk_secid; in smack_task_getsecid()
3253 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument
3258 *secid = iskp->smk_secid; in smack_ipc_getsecid()
[all …]
Dsmack_access.c592 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
598 if (skp->smk_secid == secid) { in smack_from_secid()
Dsmackfs.c188 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
/security/selinux/include/
Dxfrm.h23 struct xfrm_sec_ctx *polsec, u32 secid);
/security/selinux/ss/
Dservices.c3653 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3726 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()