Searched refs:sid (Results 1 – 5 of 5) sorted by relevance
1184 struct pid *sid; in SYSCALL_DEFINE1() local1189 sid = task_session(current); in SYSCALL_DEFINE1()1195 sid = task_session(p); in SYSCALL_DEFINE1()1196 if (!sid) in SYSCALL_DEFINE1()1203 retval = pid_vnr(sid); in SYSCALL_DEFINE1()1223 struct pid *sid = task_pid(group_leader); in ksys_setsid() local1224 pid_t session = pid_vnr(sid); in ksys_setsid()1235 if (pid_task(sid, PIDTYPE_PGID)) in ksys_setsid()1239 set_special_pids(sid); in ksys_setsid()
2187 u32 sid; in audit_log_task_context() local2189 security_current_getsecid_subj(&sid); in audit_log_task_context()2190 if (!sid) in audit_log_task_context()2193 error = security_secid_to_secctx(sid, &ctx, &len); in audit_log_task_context()
1341 u32 sid; in audit_filter() local1371 security_current_getsecid_subj(&sid); in audit_filter()1372 result = security_audit_rule_match(sid, in audit_filter()
470 u32 sid; in audit_filter_rules() local678 security_current_getsecid_subj(&sid); in audit_filter_rules()681 result = security_audit_rule_match(sid, f->type, in audit_filter_rules()1087 u32 sid, char *comm) in audit_log_pid_context() argument1101 if (sid) { in audit_log_pid_context()1102 if (security_secid_to_secctx(sid, &ctx, &len)) { in audit_log_pid_context()
845 struct pid *sid; in check_kill_permission() local862 sid = task_session(t); in check_kill_permission()867 if (!sid || sid == task_session(current)) in check_kill_permission()