Searched refs:sid (Results 1 – 5 of 5) sorted by relevance
1191 struct pid *sid; in SYSCALL_DEFINE1() local1196 sid = task_session(current); in SYSCALL_DEFINE1()1202 sid = task_session(p); in SYSCALL_DEFINE1()1203 if (!sid) in SYSCALL_DEFINE1()1210 retval = pid_vnr(sid); in SYSCALL_DEFINE1()1230 struct pid *sid = task_pid(group_leader); in ksys_setsid() local1231 pid_t session = pid_vnr(sid); in ksys_setsid()1242 if (pid_task(sid, PIDTYPE_PGID)) in ksys_setsid()1246 set_special_pids(sid); in ksys_setsid()
2186 u32 sid; in audit_log_task_context() local2188 security_current_getsecid_subj(&sid); in audit_log_task_context()2189 if (!sid) in audit_log_task_context()2192 error = security_secid_to_secctx(sid, &ctx, &len); in audit_log_task_context()
1343 u32 sid; in audit_filter() local1373 security_current_getsecid_subj(&sid); in audit_filter()1374 result = security_audit_rule_match(sid, in audit_filter()
473 u32 sid; in audit_filter_rules() local681 security_current_getsecid_subj(&sid); in audit_filter_rules()684 result = security_audit_rule_match(sid, f->type, in audit_filter_rules()1095 u32 sid, char *comm) in audit_log_pid_context() argument1109 if (sid) { in audit_log_pid_context()1110 if (security_secid_to_secctx(sid, &ctx, &len)) { in audit_log_pid_context()
847 struct pid *sid; in check_kill_permission() local864 sid = task_session(t); in check_kill_permission()869 if (!sid || sid == task_session(current)) in check_kill_permission()