Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 35 of 35) sorted by relevance

/linux-4.4.14/net/netlabel/
Dnetlabel_unlabeled.c83 u32 secid; member
91 u32 secid; member
253 u32 secid) in netlbl_unlhsh_add_addr4() argument
265 entry->secid = secid; in netlbl_unlhsh_add_addr4()
293 u32 secid) in netlbl_unlhsh_add_addr6() argument
309 entry->secid = secid; in netlbl_unlhsh_add_addr6()
388 u32 secid, in netlbl_unlhsh_add() argument
430 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add()
443 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add()
460 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add()
[all …]
Dnetlabel_user.c110 if (audit_info->secid != 0 && in netlbl_audit_start_common()
111 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
Dnetlabel_user.h51 security_task_getsecid(current, &audit_info->secid); in netlbl_netlink_auditinfo()
Dnetlabel_unlabeled.h228 u32 secid,
Dnetlabel_kapi.c219 u32 secid, in netlbl_cfg_unlbl_static_add() argument
239 secid, audit_info); in netlbl_cfg_unlbl_static_add()
/linux-4.4.14/net/netfilter/
Dxt_SECMARK.c42 secmark = info->secid; in secmark_tg()
57 info->secid = 0; in checkentry_lsm()
60 &info->secid); in checkentry_lsm()
67 if (!info->secid) { in checkentry_lsm()
72 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
/linux-4.4.14/drivers/dio/
Ddio.c118 u_char prid, secid, i; in dio_find() local
152 secid = DIO_SECID(va); in dio_find()
153 id = DIO_ENCODE_ID(prid, secid); in dio_find()
200 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
246 secid = DIO_SECID(va); in dio_init()
247 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init()
255 printk(":%02X", secid); in dio_init()
Ddio-sysfs.c45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
/linux-4.4.14/include/linux/
Dsecurity.h276 void security_inode_getsecid(const struct inode *inode, u32 *secid);
299 int security_kernel_act_as(struct cred *new, u32 secid);
309 void security_task_getsecid(struct task_struct *p, u32 *secid);
319 int sig, u32 secid);
325 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid);
352 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
353 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
737 static inline void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument
739 *secid = 0; in security_inode_getsecid()
841 static inline int security_kernel_act_as(struct cred *cred, u32 secid) in security_kernel_act_as() argument
[all …]
Dlsm_hooks.h1423 void (*inode_getsecid)(const struct inode *inode, u32 *secid);
1451 int (*kernel_act_as)(struct cred *new, u32 secid);
1461 void (*task_getsecid)(struct task_struct *p, u32 *secid);
1471 int sig, u32 secid);
1478 void (*ipc_getsecid)(struct kern_ipc_perm *ipcp, u32 *secid);
1515 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
1516 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
1551 struct sk_buff *skb, u32 *secid);
1555 void (*sk_getsecid)(struct sock *sk, u32 *secid);
1562 int (*secmark_relabel_packet)(u32 secid);
[all …]
Daudit.h482 extern void audit_log_secctx(struct audit_buffer *ab, u32 secid);
484 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
538 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
/linux-4.4.14/security/
Dsecurity.c724 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument
726 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid()
877 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
879 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as()
934 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument
936 *secid = 0; in security_task_getsecid()
937 call_void_hook(task_getsecid, p, secid); in security_task_getsecid()
978 int sig, u32 secid) in security_task_kill() argument
980 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill()
1016 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument
[all …]
/linux-4.4.14/include/net/
Dscm.h33 u32 secid; /* Passed security ID */ member
46 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
Dnetlabel.h111 u32 secid; member
215 u32 secid; member
372 u32 secid,
466 u32 secid, in netlbl_cfg_unlbl_static_add() argument
Daf_unix.h36 u32 secid; /* Security ID */ member
Drequest_sock.h67 u32 secid; member
/linux-4.4.14/security/selinux/
Dxfrm.c342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
352 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
355 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire()
367 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
Dnetlabel.c123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
Dhooks.c3185 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument
3188 *secid = isec->sid; in selinux_inode_getsecid()
3602 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument
3608 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as()
3613 tsec->sid = secid; in selinux_kernel_act_as()
3671 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument
3673 *secid = task_sid(p); in selinux_task_getsecid()
3722 int sig, u32 secid) in selinux_task_kill() argument
3731 if (secid) in selinux_task_kill()
3732 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill()
[all …]
/linux-4.4.14/include/uapi/linux/netfilter/
Dxt_SECMARK.h18 __u32 secid; member
/linux-4.4.14/kernel/
Dcred.c652 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
654 return security_kernel_act_as(new, secid); in set_security_override()
670 u32 secid; in set_security_override_from_ctx() local
673 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
677 return set_security_override(new, secid); in set_security_override_from_ctx()
Daudit.c2032 void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
2037 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx()
Dsignal.c1331 const struct cred *cred, u32 secid) in kill_pid_info_as_cred() argument
1350 ret = security_task_kill(p, info, sig, secid); in kill_pid_info_as_cred()
/linux-4.4.14/security/smack/
Dsmack_lsm.c1539 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument
1543 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid()
2023 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
2026 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as()
2117 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument
2121 *secid = skp->smk_secid; in smack_task_getsecid()
2207 int sig, u32 secid) in smack_task_kill() argument
2220 if (secid == 0) { in smack_task_kill()
2230 skp = smack_from_secid(secid); in smack_task_kill()
3319 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument
[all …]
Dsmack_access.c601 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
607 if (skp->smk_secid == secid) { in smack_from_secid()
Dsmackfs.c199 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
/linux-4.4.14/Documentation/networking/
Dsecid.txt3 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
D00-INDEX193 secid.txt
194 - Explanation of the secid member in flow structures.
/linux-4.4.14/security/selinux/include/
Dxfrm.h22 struct xfrm_sec_ctx *polsec, u32 secid);
/linux-4.4.14/drivers/usb/core/
Ddevio.c78 u32 secid; member
94 u32 secid; member
495 u32 secid = 0; in async_completed() local
511 secid = as->secid; in async_completed()
525 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid); in async_completed()
919 security_task_getsecid(current, &ps->secid); in usbdev_open()
1556 security_task_getsecid(current, &as->secid); in proc_do_submiturb()
2397 ps->disc_pid, ps->cred, ps->secid); in usbdev_remove()
/linux-4.4.14/security/integrity/ima/
Dima.h247 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
/linux-4.4.14/net/unix/
Daf_unix.c143 UNIXCB(skb).secid = scm->secid; in unix_get_secdata()
148 scm->secid = UNIXCB(skb).secid; in unix_set_secdata()
153 return (scm->secid == UNIXCB(skb).secid); in unix_secdata_eq()
/linux-4.4.14/net/ipv4/
Dip_sockglue.c117 u32 seclen, secid; in ip_cmsg_recv_security() local
120 err = security_socket_getpeersec_dgram(NULL, skb, &secid); in ip_cmsg_recv_security()
124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
Dcipso_ipv4.c1553 *(u32 *)&buffer[2] = secattr->attr.secid; in cipso_v4_gentag_loc()
1573 secattr->attr.secid = *(u32 *)&tag[2]; in cipso_v4_parsetag_loc()
/linux-4.4.14/security/selinux/ss/
Dservices.c3338 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3409 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()