/security/selinux/include/ |
D | objsec.h | 33 u32 sid; /* current SID */ member 50 u32 sid; /* SID of this object */ member 57 u32 sid; /* SID of open file description */ member 64 u32 sid; /* SID of file system superblock */ member 75 u32 sid; /* SID of message */ member 80 u32 sid; /* SID of IPC resource */ member 86 u32 sid; /* SID for this interface */ member 94 u32 sid; /* SID for this node */ member 99 u32 sid; /* SID for this node */ member 115 u32 sid; /* SID of this object */ member [all …]
|
D | xfrm.h | 43 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall); 44 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid); 74 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, in selinux_xfrm_decode_session() argument 77 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 85 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument 87 *sid = SECSID_NULL; in selinux_xfrm_skb_sid()
|
D | netlabel.h | 38 u32 *sid); 41 u32 sid); 88 u32 *sid) in selinux_netlbl_skbuff_getsid() argument 91 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid() 96 u32 sid) in selinux_netlbl_skbuff_setsid() argument
|
D | security.h | 330 int security_sid_to_context(struct selinux_state *state, u32 sid, 334 u32 sid, char **scontext, u32 *scontext_len); 337 u32 sid, char **scontext, u32 *scontext_len); 352 u32 *sid); 386 u32 sid, u32 mls_sid, u32 *new_sid); 413 u32 *sid); 417 u32 *sid); 422 u32 *sid); 425 u32 sid, 430 u32 *sid) in security_netlbl_secattr_to_sid() argument [all …]
|
D | ibpkey.h | 19 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid); 25 static inline int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey, u32 *sid) in sel_ib_pkey_sid() argument 27 *sid = SECINITSID_UNLABELED; in sel_ib_pkey_sid()
|
D | netnode.h | 22 int sel_netnode_sid(void *addr, u16 family, u32 *sid);
|
D | netif.h | 21 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid);
|
D | netport.h | 21 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid);
|
D | audit.h | 47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/selinux/ |
D | hooks.c | 218 tsec->osid = tsec->sid = SECINITSID_KERNEL; in cred_init_security() 229 return tsec->sid; in cred_sid() 237 u32 sid; in task_sid_subj() local 240 sid = cred_sid(rcu_dereference(task->cred)); in task_sid_subj() 242 return sid; in task_sid_subj() 250 u32 sid; in task_sid_obj() local 253 sid = cred_sid(__task_cred(task)); in task_sid_obj() 255 return sid; in task_sid_obj() 419 static int may_context_mount_sb_relabel(u32 sid, in may_context_mount_sb_relabel() argument 427 tsec->sid, sbsec->sid, SECCLASS_FILESYSTEM, in may_context_mount_sb_relabel() [all …]
|
D | ibpkey.c | 129 static int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid_slow() argument 139 *sid = pkey->psec.sid; in sel_ib_pkey_sid_slow() 145 sid); in sel_ib_pkey_sid_slow() 160 new->psec.sid = *sid; in sel_ib_pkey_sid_slow() 181 int sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid) in sel_ib_pkey_sid() argument 188 *sid = pkey->psec.sid; in sel_ib_pkey_sid() 194 return sel_ib_pkey_sid_slow(subnet_prefix, pkey_num, sid); in sel_ib_pkey_sid()
|
D | netport.c | 137 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid_slow() argument 146 *sid = port->psec.sid; in sel_netport_sid_slow() 151 ret = security_port_sid(&selinux_state, protocol, pnum, sid); in sel_netport_sid_slow() 158 new->psec.sid = *sid; in sel_netport_sid_slow() 183 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid() argument 190 *sid = port->psec.sid; in sel_netport_sid() 196 return sel_netport_sid_slow(protocol, pnum, sid); in sel_netport_sid()
|
D | netnode.c | 189 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) in sel_netnode_sid_slow() argument 198 *sid = node->nsec.sid; in sel_netnode_sid_slow() 207 addr, sizeof(struct in_addr), sid); in sel_netnode_sid_slow() 213 addr, sizeof(struct in6_addr), sid); in sel_netnode_sid_slow() 223 new->nsec.sid = *sid; in sel_netnode_sid_slow() 249 int sel_netnode_sid(void *addr, u16 family, u32 *sid) in sel_netnode_sid() argument 256 *sid = node->nsec.sid; in sel_netnode_sid() 262 return sel_netnode_sid_slow(addr, family, sid); in sel_netnode_sid()
|
D | netif.c | 132 static int sel_netif_sid_slow(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid_slow() argument 152 *sid = netif->nsec.sid; in sel_netif_sid_slow() 156 ret = security_netif_sid(&selinux_state, dev->name, sid); in sel_netif_sid_slow() 163 new->nsec.sid = *sid; in sel_netif_sid_slow() 191 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid() argument 198 *sid = netif->nsec.sid; in sel_netif_sid() 204 return sel_netif_sid_slow(ns, ifindex, sid); in sel_netif_sid()
|
D | xfrm.c | 107 tsec->sid, ctx->ctx_sid, in selinux_xfrm_alloc_user() 144 tsec->sid, ctx->ctx_sid, in selinux_xfrm_delete() 228 u32 *sid, int ckall) in selinux_xfrm_skb_sid_ingress() argument 246 *sid = SECSID_NULL; in selinux_xfrm_skb_sid_ingress() 254 *sid = sid_session; in selinux_xfrm_skb_sid_ingress() 262 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall) in selinux_xfrm_decode_session() argument 265 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 268 return selinux_xfrm_skb_sid_ingress(skb, sid, ckall); in selinux_xfrm_decode_session() 271 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument 275 rc = selinux_xfrm_skb_sid_ingress(skb, sid, 0); in selinux_xfrm_skb_sid() [all …]
|
D | netlabel.c | 44 u32 *sid) in selinux_netlbl_sidlookup_cached() argument 48 rc = security_netlbl_secattr_to_sid(&selinux_state, secattr, sid); in selinux_netlbl_sidlookup_cached() 79 rc = security_netlbl_sid_to_secattr(&selinux_state, sksec->sid, in selinux_netlbl_sock_genattr() 101 u32 sid) in selinux_netlbl_sock_getattr() argument 110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 191 u32 *sid) in selinux_netlbl_skbuff_getsid() argument 197 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid() 205 &secattr, sid); in selinux_netlbl_skbuff_getsid() 207 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid() 227 u32 sid) in selinux_netlbl_skbuff_setsid() argument [all …]
|
D | selinuxfs.c | 681 u32 sid, len; in sel_write_context() local 690 length = security_context_to_sid(state, buf, size, &sid, GFP_KERNEL); in sel_write_context() 694 length = security_sid_to_context(state, sid, &canon, &len); in sel_write_context() 1129 u32 sid, *sids = NULL; in sel_write_user() local 1156 length = security_context_str_to_sid(state, con, &sid, GFP_KERNEL); in sel_write_user() 1160 length = security_get_user_sids(state, sid, user, &sids, &nsids); in sel_write_user() 1432 u32 sid; in sel_make_bools() local 1466 SECCLASS_FILE, &sid); in sel_make_bools() 1470 sid = SECINITSID_SECURITY; in sel_make_bools() 1473 isec->sid = sid; in sel_make_bools() [all …]
|
/security/selinux/ss/ |
D | sidtab.c | 31 #define sid_to_index(sid) (sid - (SECINITSID_NUM + 1)) argument 61 u32 sid = 0; in context_to_sid() local 68 sid = entry->sid; in context_to_sid() 73 return sid; in context_to_sid() 76 int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context) in sidtab_set_initial() argument 82 if (sid == 0 || sid > SECINITSID_NUM) in sidtab_set_initial() 85 isid = &s->isids[sid - 1]; in sidtab_set_initial() 105 isid->entry.sid = sid; in sidtab_set_initial() 232 static struct sidtab_entry *sidtab_lookup_initial(struct sidtab *s, u32 sid) in sidtab_lookup_initial() argument 234 return s->isids[sid - 1].set ? &s->isids[sid - 1].entry : NULL; in sidtab_lookup_initial() [all …]
|
D | sidtab.h | 21 u32 sid; member 107 int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context); 108 struct sidtab_entry *sidtab_search_entry(struct sidtab *s, u32 sid); 109 struct sidtab_entry *sidtab_search_entry_force(struct sidtab *s, u32 sid); 111 static inline struct context *sidtab_search(struct sidtab *s, u32 sid) in sidtab_search() argument 113 struct sidtab_entry *entry = sidtab_search_entry(s, sid); in sidtab_search() 118 static inline struct context *sidtab_search_force(struct sidtab *s, u32 sid) in sidtab_search_force() argument 120 struct sidtab_entry *entry = sidtab_search_entry_force(s, sid); in sidtab_search_force() 132 int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid);
|
D | services.c | 1322 const char *security_get_initial_sid_context(u32 sid) in security_get_initial_sid_context() argument 1324 if (unlikely(sid > SECINITSID_NUM)) in security_get_initial_sid_context() 1326 return initial_sid_to_string[sid]; in security_get_initial_sid_context() 1330 u32 sid, char **scontext, in security_sid_to_context_core() argument 1345 if (sid <= SECINITSID_NUM) { in security_sid_to_context_core() 1347 const char *s = initial_sid_to_string[sid]; in security_sid_to_context_core() 1361 "load_policy on unknown SID %d\n", __func__, sid); in security_sid_to_context_core() 1370 entry = sidtab_search_entry_force(sidtab, sid); in security_sid_to_context_core() 1372 entry = sidtab_search_entry(sidtab, sid); in security_sid_to_context_core() 1375 __func__, sid); in security_sid_to_context_core() [all …]
|
D | policydb.h | 205 u32 sid[2]; /* SID(s) */ member
|
D | policydb.c | 882 u32 sid = c->sid[0]; in policydb_load_isids() local 883 const char *name = security_get_initial_sid_context(sid); in policydb_load_isids() 885 if (sid == SECSID_NULL) { in policydb_load_isids() 895 rc = sidtab_set_initial(s, sid, &c->context[0]); in policydb_load_isids() 2250 c->sid[0] = le32_to_cpu(buf[0]); in ocontext_read() 3287 buf[0] = cpu_to_le32(c->sid[0]); in ocontext_write()
|
/security/apparmor/ |
D | audit.c | 223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 229 label = aa_secid_to_label(sid); in aa_audit_rule_match()
|
/security/apparmor/include/ |
D | audit.h | 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|