Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 35 of 35) sorted by relevance

/linux-4.1.27/net/netlabel/
Dnetlabel_unlabeled.c83 u32 secid; member
91 u32 secid; member
253 u32 secid) in netlbl_unlhsh_add_addr4() argument
265 entry->secid = secid; in netlbl_unlhsh_add_addr4()
293 u32 secid) in netlbl_unlhsh_add_addr6() argument
309 entry->secid = secid; in netlbl_unlhsh_add_addr6()
388 u32 secid, in netlbl_unlhsh_add() argument
430 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add()
443 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add()
460 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add()
[all …]
Dnetlabel_user.c110 if (audit_info->secid != 0 && in netlbl_audit_start_common()
111 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
Dnetlabel_user.h51 security_task_getsecid(current, &audit_info->secid); in netlbl_netlink_auditinfo()
Dnetlabel_unlabeled.h228 u32 secid,
Dnetlabel_kapi.c219 u32 secid, in netlbl_cfg_unlbl_static_add() argument
239 secid, audit_info); in netlbl_cfg_unlbl_static_add()
/linux-4.1.27/net/netfilter/
Dxt_SECMARK.c42 secmark = info->secid; in secmark_tg()
57 info->secid = 0; in checkentry_lsm()
60 &info->secid); in checkentry_lsm()
67 if (!info->secid) { in checkentry_lsm()
72 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
/linux-4.1.27/drivers/dio/
Ddio.c118 u_char prid, secid, i; in dio_find() local
152 secid = DIO_SECID(va); in dio_find()
153 id = DIO_ENCODE_ID(prid, secid); in dio_find()
200 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
246 secid = DIO_SECID(va); in dio_init()
247 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init()
255 printk(":%02X", secid); in dio_init()
Ddio-sysfs.c45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
/linux-4.1.27/include/linux/
Dsecurity.h1572 void (*inode_getsecid) (const struct inode *inode, u32 *secid);
1602 int (*kernel_act_as)(struct cred *new, u32 secid);
1612 void (*task_getsecid) (struct task_struct *p, u32 *secid);
1622 struct siginfo *info, int sig, u32 secid);
1630 void (*ipc_getsecid) (struct kern_ipc_perm *ipcp, u32 *secid);
1667 int (*secid_to_secctx) (u32 secid, char **secdata, u32 *seclen);
1668 int (*secctx_to_secid) (const char *secdata, u32 seclen, u32 *secid);
1699 int (*socket_getpeersec_dgram) (struct socket *sock, struct sk_buff *skb, u32 *secid);
1703 void (*sk_getsecid) (struct sock *sk, u32 *secid);
1709 int (*secmark_relabel_packet) (u32 secid);
[all …]
Daudit.h478 extern void audit_log_secctx(struct audit_buffer *ab, u32 secid);
480 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
534 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
/linux-4.1.27/security/
Dcapability.c266 static void cap_inode_getsecid(const struct inode *inode, u32 *secid) in cap_inode_getsecid() argument
268 *secid = 0; in cap_inode_getsecid()
417 static int cap_kernel_act_as(struct cred *new, u32 secid) in cap_kernel_act_as() argument
457 static void cap_task_getsecid(struct task_struct *p, u32 *secid) in cap_task_getsecid() argument
459 *secid = 0; in cap_task_getsecid()
489 int sig, u32 secid) in cap_task_kill() argument
503 static void cap_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in cap_ipc_getsecid() argument
505 *secid = 0; in cap_ipc_getsecid()
692 struct sk_buff *skb, u32 *secid) in cap_socket_getpeersec_dgram() argument
710 static void cap_sk_getsecid(struct sock *sk, u32 *secid) in cap_sk_getsecid() argument
[all …]
Dsecurity.c704 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument
706 security_ops->inode_getsecid(inode, secid); in security_inode_getsecid()
860 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
862 return security_ops->kernel_act_as(new, secid); in security_kernel_act_as()
917 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument
919 security_ops->task_getsecid(p, secid); in security_task_getsecid()
960 int sig, u32 secid) in security_task_kill() argument
962 return security_ops->task_kill(p, info, sig, secid); in security_task_kill()
992 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument
994 security_ops->ipc_getsecid(ipcp, secid); in security_ipc_getsecid()
[all …]
/linux-4.1.27/include/net/
Dscm.h33 u32 secid; /* Passed security ID */ member
46 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
Daf_unix.h36 u32 secid; /* Security ID */ member
42 #define UNIXSID(skb) (&UNIXCB((skb)).secid)
Dnetlabel.h111 u32 secid; member
215 u32 secid; member
372 u32 secid,
466 u32 secid, in netlbl_cfg_unlbl_static_add() argument
Drequest_sock.h67 u32 secid; member
/linux-4.1.27/security/selinux/
Dxfrm.c345 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
355 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
358 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire()
370 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
Dnetlabel.c123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
Dhooks.c3186 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument
3189 *secid = isec->sid; in selinux_inode_getsecid()
3568 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument
3574 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as()
3579 tsec->sid = secid; in selinux_kernel_act_as()
3637 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument
3639 *secid = task_sid(p); in selinux_task_getsecid()
3706 int sig, u32 secid) in selinux_task_kill() argument
3715 if (secid) in selinux_task_kill()
3716 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill()
[all …]
/linux-4.1.27/include/uapi/linux/netfilter/
Dxt_SECMARK.h18 __u32 secid; member
/linux-4.1.27/kernel/
Dcred.c647 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
649 return security_kernel_act_as(new, secid); in set_security_override()
665 u32 secid; in set_security_override_from_ctx() local
668 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
672 return set_security_override(new, secid); in set_security_override_from_ctx()
Daudit.c2018 void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
2023 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx()
Dsignal.c1382 const struct cred *cred, u32 secid) in kill_pid_info_as_cred() argument
1401 ret = security_task_kill(p, info, sig, secid); in kill_pid_info_as_cred()
/linux-4.1.27/security/smack/
Dsmack_lsm.c1351 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument
1355 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid()
1825 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
1828 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as()
1919 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument
1923 *secid = skp->smk_secid; in smack_task_getsecid()
2024 int sig, u32 secid) in smack_task_kill() argument
2037 if (secid == 0) { in smack_task_kill()
2047 skp = smack_from_secid(secid); in smack_task_kill()
3044 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument
[all …]
Dsmack_access.c596 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
602 if (skp->smk_secid == secid) { in smack_from_secid()
Dsmackfs.c203 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
/linux-4.1.27/Documentation/networking/
Dsecid.txt3 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
D00-INDEX193 secid.txt
194 - Explanation of the secid member in flow structures.
/linux-4.1.27/security/selinux/include/
Dxfrm.h22 struct xfrm_sec_ctx *polsec, u32 secid);
/linux-4.1.27/drivers/usb/core/
Ddevio.c78 u32 secid; member
94 u32 secid; member
495 u32 secid = 0; in async_completed() local
511 secid = as->secid; in async_completed()
525 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid); in async_completed()
919 security_task_getsecid(current, &ps->secid); in usbdev_open()
1553 security_task_getsecid(current, &as->secid); in proc_do_submiturb()
2392 ps->disc_pid, ps->cred, ps->secid); in usbdev_remove()
/linux-4.1.27/security/integrity/ima/
Dima.h240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
/linux-4.1.27/net/ipv4/
Dip_sockglue.c117 u32 seclen, secid; in ip_cmsg_recv_security() local
120 err = security_socket_getpeersec_dgram(NULL, skb, &secid); in ip_cmsg_recv_security()
124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
Dcipso_ipv4.c1553 *(u32 *)&buffer[2] = secattr->attr.secid; in cipso_v4_gentag_loc()
1573 secattr->attr.secid = *(u32 *)&tag[2]; in cipso_v4_parsetag_loc()
/linux-4.1.27/net/unix/
Daf_unix.c143 memcpy(UNIXSID(skb), &scm->secid, sizeof(u32)); in unix_get_secdata()
148 scm->secid = *UNIXSID(skb); in unix_set_secdata()
/linux-4.1.27/security/selinux/ss/
Dservices.c3169 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3240 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()