Lines Matching refs:sid
1322 const char *security_get_initial_sid_context(u32 sid) in security_get_initial_sid_context() argument
1324 if (unlikely(sid > SECINITSID_NUM)) in security_get_initial_sid_context()
1326 return initial_sid_to_string[sid]; in security_get_initial_sid_context()
1330 u32 sid, char **scontext, in security_sid_to_context_core() argument
1345 if (sid <= SECINITSID_NUM) { in security_sid_to_context_core()
1347 const char *s = initial_sid_to_string[sid]; in security_sid_to_context_core()
1361 "load_policy on unknown SID %d\n", __func__, sid); in security_sid_to_context_core()
1370 entry = sidtab_search_entry_force(sidtab, sid); in security_sid_to_context_core()
1372 entry = sidtab_search_entry(sidtab, sid); in security_sid_to_context_core()
1375 __func__, sid); in security_sid_to_context_core()
1403 u32 sid, char **scontext, u32 *scontext_len) in security_sid_to_context() argument
1405 return security_sid_to_context_core(state, sid, scontext, in security_sid_to_context()
1409 int security_sid_to_context_force(struct selinux_state *state, u32 sid, in security_sid_to_context_force() argument
1412 return security_sid_to_context_core(state, sid, scontext, in security_sid_to_context_force()
1430 int security_sid_to_context_inval(struct selinux_state *state, u32 sid, in security_sid_to_context_inval() argument
1433 return security_sid_to_context_core(state, sid, scontext, in security_sid_to_context_inval()
1520 u32 *sid, u32 def_sid, gfp_t gfp_flags, in security_context_to_sid_core() argument
1546 *sid = i; in security_context_to_sid_core()
1550 *sid = SECINITSID_KERNEL; in security_context_to_sid_core()
1553 *sid = SECSID_NULL; in security_context_to_sid_core()
1575 rc = sidtab_context_to_sid(sidtab, &context, sid); in security_context_to_sid_core()
1608 const char *scontext, u32 scontext_len, u32 *sid, in security_context_to_sid() argument
1612 sid, SECSID_NULL, gfp, 0); in security_context_to_sid()
1616 const char *scontext, u32 *sid, gfp_t gfp) in security_context_str_to_sid() argument
1619 sid, gfp); in security_context_str_to_sid()
1643 u32 *sid, u32 def_sid, gfp_t gfp_flags) in security_context_to_sid_default() argument
1646 sid, def_sid, gfp_flags, 1); in security_context_to_sid_default()
1651 u32 *sid) in security_context_to_sid_force() argument
1654 sid, SECSID_NULL, GFP_KERNEL, 1); in security_context_to_sid_force()
2112 while (oc && oc->sid[0] != SECINITSID_UNLABELED) in convert_context()
2405 u32 sid; in ocontext_to_sid() local
2408 sid = smp_load_acquire(&c->sid[index]); in ocontext_to_sid()
2409 if (!sid) { in ocontext_to_sid()
2410 rc = sidtab_context_to_sid(sidtab, &c->context[index], &sid); in ocontext_to_sid()
2418 smp_store_release(&c->sid[index], sid); in ocontext_to_sid()
2420 *out_sid = sid; in ocontext_to_sid()
2764 u32 *mysids = NULL, *mysids2, sid; in security_get_user_sids() local
2812 rc = sidtab_context_to_sid(sidtab, &usercon, &sid); in security_get_user_sids()
2820 mysids[mynel++] = sid; in security_get_user_sids()
2830 mysids[mynel++] = sid; in security_get_user_sids()
2883 u32 *sid) in __security_genfs_sid() argument
2897 *sid = SECINITSID_UNLABELED; in __security_genfs_sid()
2918 return ocontext_to_sid(sidtab, c, 0, sid); in __security_genfs_sid()
2936 u32 *sid) in security_genfs_sid() argument
2942 *sid = SECINITSID_UNLABELED; in security_genfs_sid()
2950 orig_sclass, sid); in security_genfs_sid()
2960 u32 *sid) in selinux_policy_genfs_sid() argument
2963 return __security_genfs_sid(policy, fstype, path, orig_sclass, sid); in selinux_policy_genfs_sid()
2983 sbsec->sid = SECINITSID_UNLABELED; in security_fs_use()
3003 rc = ocontext_to_sid(sidtab, c, 0, &sbsec->sid); in security_fs_use()
3012 SECCLASS_DIR, &sbsec->sid); in security_fs_use()
3214 u32 sid, u32 mls_sid, u32 *new_sid) in security_sid_mls_copy() argument
3227 *new_sid = sid; in security_sid_mls_copy()
3241 *new_sid = sid; in security_sid_mls_copy()
3246 context1 = sidtab_search(sidtab, sid); in security_sid_mls_copy()
3249 __func__, sid); in security_sid_mls_copy()
3697 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3723 ctxt = sidtab_search(policy->sidtab, sid); in selinux_audit_rule_match()
3726 sid); in selinux_audit_rule_match()
3843 u32 sid) in security_netlbl_cache_add() argument
3856 *sid_cache = sid; in security_netlbl_cache_add()
3880 u32 *sid) in security_netlbl_secattr_to_sid() argument
3890 *sid = SECSID_NULL; in security_netlbl_secattr_to_sid()
3902 *sid = *(u32 *)secattr->cache->data; in security_netlbl_secattr_to_sid()
3904 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3927 rc = sidtab_context_to_sid(sidtab, &ctx_new, sid); in security_netlbl_secattr_to_sid()
3936 security_netlbl_cache_add(secattr, *sid); in security_netlbl_secattr_to_sid()
3938 *sid = SECSID_NULL; in security_netlbl_secattr_to_sid()
3957 u32 sid, struct netlbl_lsm_secattr *secattr) in security_netlbl_sid_to_secattr() argument
3972 ctx = sidtab_search(policy->sidtab, sid); in security_netlbl_sid_to_secattr()
3982 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()