/linux-4.1.27/net/netlabel/ |
D | netlabel_unlabeled.c | 83 u32 secid; member 91 u32 secid; member 253 u32 secid) in netlbl_unlhsh_add_addr4() argument 265 entry->secid = secid; in netlbl_unlhsh_add_addr4() 293 u32 secid) in netlbl_unlhsh_add_addr6() argument 309 entry->secid = secid; in netlbl_unlhsh_add_addr6() 388 u32 secid, in netlbl_unlhsh_add() argument 430 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add() 443 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add() 460 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add() [all …]
|
D | netlabel_user.c | 110 if (audit_info->secid != 0 && in netlbl_audit_start_common() 111 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
|
D | netlabel_user.h | 51 security_task_getsecid(current, &audit_info->secid); in netlbl_netlink_auditinfo()
|
D | netlabel_unlabeled.h | 228 u32 secid,
|
D | netlabel_kapi.c | 219 u32 secid, in netlbl_cfg_unlbl_static_add() argument 239 secid, audit_info); in netlbl_cfg_unlbl_static_add()
|
/linux-4.1.27/net/netfilter/ |
D | xt_SECMARK.c | 42 secmark = info->secid; in secmark_tg() 57 info->secid = 0; in checkentry_lsm() 60 &info->secid); in checkentry_lsm() 67 if (!info->secid) { in checkentry_lsm() 72 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
|
/linux-4.1.27/drivers/dio/ |
D | dio.c | 118 u_char prid, secid, i; in dio_find() local 152 secid = DIO_SECID(va); in dio_find() 153 id = DIO_ENCODE_ID(prid, secid); in dio_find() 200 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local 246 secid = DIO_SECID(va); in dio_init() 247 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init() 255 printk(":%02X", secid); in dio_init()
|
D | dio-sysfs.c | 45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
|
/linux-4.1.27/include/linux/ |
D | security.h | 1572 void (*inode_getsecid) (const struct inode *inode, u32 *secid); 1602 int (*kernel_act_as)(struct cred *new, u32 secid); 1612 void (*task_getsecid) (struct task_struct *p, u32 *secid); 1622 struct siginfo *info, int sig, u32 secid); 1630 void (*ipc_getsecid) (struct kern_ipc_perm *ipcp, u32 *secid); 1667 int (*secid_to_secctx) (u32 secid, char **secdata, u32 *seclen); 1668 int (*secctx_to_secid) (const char *secdata, u32 seclen, u32 *secid); 1699 int (*socket_getpeersec_dgram) (struct socket *sock, struct sk_buff *skb, u32 *secid); 1703 void (*sk_getsecid) (struct sock *sk, u32 *secid); 1709 int (*secmark_relabel_packet) (u32 secid); [all …]
|
D | audit.h | 478 extern void audit_log_secctx(struct audit_buffer *ab, u32 secid); 480 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument 534 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
|
/linux-4.1.27/security/ |
D | capability.c | 266 static void cap_inode_getsecid(const struct inode *inode, u32 *secid) in cap_inode_getsecid() argument 268 *secid = 0; in cap_inode_getsecid() 417 static int cap_kernel_act_as(struct cred *new, u32 secid) in cap_kernel_act_as() argument 457 static void cap_task_getsecid(struct task_struct *p, u32 *secid) in cap_task_getsecid() argument 459 *secid = 0; in cap_task_getsecid() 489 int sig, u32 secid) in cap_task_kill() argument 503 static void cap_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in cap_ipc_getsecid() argument 505 *secid = 0; in cap_ipc_getsecid() 692 struct sk_buff *skb, u32 *secid) in cap_socket_getpeersec_dgram() argument 710 static void cap_sk_getsecid(struct sock *sk, u32 *secid) in cap_sk_getsecid() argument [all …]
|
D | security.c | 704 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument 706 security_ops->inode_getsecid(inode, secid); in security_inode_getsecid() 860 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument 862 return security_ops->kernel_act_as(new, secid); in security_kernel_act_as() 917 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument 919 security_ops->task_getsecid(p, secid); in security_task_getsecid() 960 int sig, u32 secid) in security_task_kill() argument 962 return security_ops->task_kill(p, info, sig, secid); in security_task_kill() 992 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument 994 security_ops->ipc_getsecid(ipcp, secid); in security_ipc_getsecid() [all …]
|
/linux-4.1.27/include/net/ |
D | scm.h | 33 u32 secid; /* Passed security ID */ member 46 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram() 97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
|
D | af_unix.h | 36 u32 secid; /* Security ID */ member 42 #define UNIXSID(skb) (&UNIXCB((skb)).secid)
|
D | netlabel.h | 111 u32 secid; member 215 u32 secid; member 372 u32 secid, 466 u32 secid, in netlbl_cfg_unlbl_static_add() argument
|
D | request_sock.h | 67 u32 secid; member
|
/linux-4.1.27/security/selinux/ |
D | xfrm.c | 345 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 355 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 358 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire() 370 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
D | netlabel.c | 123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
D | hooks.c | 3186 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument 3189 *secid = isec->sid; in selinux_inode_getsecid() 3568 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument 3574 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as() 3579 tsec->sid = secid; in selinux_kernel_act_as() 3637 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument 3639 *secid = task_sid(p); in selinux_task_getsecid() 3706 int sig, u32 secid) in selinux_task_kill() argument 3715 if (secid) in selinux_task_kill() 3716 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill() [all …]
|
/linux-4.1.27/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 18 __u32 secid; member
|
/linux-4.1.27/kernel/ |
D | cred.c | 647 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument 649 return security_kernel_act_as(new, secid); in set_security_override() 665 u32 secid; in set_security_override_from_ctx() local 668 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx() 672 return set_security_override(new, secid); in set_security_override_from_ctx()
|
D | audit.c | 2018 void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument 2023 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx()
|
D | signal.c | 1382 const struct cred *cred, u32 secid) in kill_pid_info_as_cred() argument 1401 ret = security_task_kill(p, info, sig, secid); in kill_pid_info_as_cred()
|
/linux-4.1.27/security/smack/ |
D | smack_lsm.c | 1351 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument 1355 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid() 1825 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 1828 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as() 1919 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument 1923 *secid = skp->smk_secid; in smack_task_getsecid() 2024 int sig, u32 secid) in smack_task_kill() argument 2037 if (secid == 0) { in smack_task_kill() 2047 skp = smack_from_secid(secid); in smack_task_kill() 3044 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument [all …]
|
D | smack_access.c | 596 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 602 if (skp->smk_secid == secid) { in smack_from_secid()
|
D | smackfs.c | 203 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
|
/linux-4.1.27/Documentation/networking/ |
D | secid.txt | 3 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
|
D | 00-INDEX | 193 secid.txt 194 - Explanation of the secid member in flow structures.
|
/linux-4.1.27/security/selinux/include/ |
D | xfrm.h | 22 struct xfrm_sec_ctx *polsec, u32 secid);
|
/linux-4.1.27/drivers/usb/core/ |
D | devio.c | 78 u32 secid; member 94 u32 secid; member 495 u32 secid = 0; in async_completed() local 511 secid = as->secid; in async_completed() 525 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid); in async_completed() 919 security_task_getsecid(current, &ps->secid); in usbdev_open() 1553 security_task_getsecid(current, &as->secid); in proc_do_submiturb() 2392 ps->disc_pid, ps->cred, ps->secid); in usbdev_remove()
|
/linux-4.1.27/security/integrity/ima/ |
D | ima.h | 240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
/linux-4.1.27/net/ipv4/ |
D | ip_sockglue.c | 117 u32 seclen, secid; in ip_cmsg_recv_security() local 120 err = security_socket_getpeersec_dgram(NULL, skb, &secid); in ip_cmsg_recv_security() 124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
|
D | cipso_ipv4.c | 1553 *(u32 *)&buffer[2] = secattr->attr.secid; in cipso_v4_gentag_loc() 1573 secattr->attr.secid = *(u32 *)&tag[2]; in cipso_v4_parsetag_loc()
|
/linux-4.1.27/net/unix/ |
D | af_unix.c | 143 memcpy(UNIXSID(skb), &scm->secid, sizeof(u32)); in unix_get_secdata() 148 scm->secid = *UNIXSID(skb); in unix_set_secdata()
|
/linux-4.1.27/security/selinux/ss/ |
D | services.c | 3169 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3240 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|