/linux-4.4.14/net/netlabel/ |
D | netlabel_unlabeled.c | 83 u32 secid; member 91 u32 secid; member 253 u32 secid) in netlbl_unlhsh_add_addr4() argument 265 entry->secid = secid; in netlbl_unlhsh_add_addr4() 293 u32 secid) in netlbl_unlhsh_add_addr6() argument 309 entry->secid = secid; in netlbl_unlhsh_add_addr6() 388 u32 secid, in netlbl_unlhsh_add() argument 430 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add() 443 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add() 460 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add() [all …]
|
D | netlabel_user.c | 110 if (audit_info->secid != 0 && in netlbl_audit_start_common() 111 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
|
D | netlabel_user.h | 51 security_task_getsecid(current, &audit_info->secid); in netlbl_netlink_auditinfo()
|
D | netlabel_unlabeled.h | 228 u32 secid,
|
D | netlabel_kapi.c | 219 u32 secid, in netlbl_cfg_unlbl_static_add() argument 239 secid, audit_info); in netlbl_cfg_unlbl_static_add()
|
/linux-4.4.14/net/netfilter/ |
D | xt_SECMARK.c | 42 secmark = info->secid; in secmark_tg() 57 info->secid = 0; in checkentry_lsm() 60 &info->secid); in checkentry_lsm() 67 if (!info->secid) { in checkentry_lsm() 72 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
|
/linux-4.4.14/drivers/dio/ |
D | dio.c | 118 u_char prid, secid, i; in dio_find() local 152 secid = DIO_SECID(va); in dio_find() 153 id = DIO_ENCODE_ID(prid, secid); in dio_find() 200 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local 246 secid = DIO_SECID(va); in dio_init() 247 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init() 255 printk(":%02X", secid); in dio_init()
|
D | dio-sysfs.c | 45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
|
/linux-4.4.14/include/linux/ |
D | security.h | 276 void security_inode_getsecid(const struct inode *inode, u32 *secid); 299 int security_kernel_act_as(struct cred *new, u32 secid); 309 void security_task_getsecid(struct task_struct *p, u32 *secid); 319 int sig, u32 secid); 325 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid); 352 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 353 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 737 static inline void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument 739 *secid = 0; in security_inode_getsecid() 841 static inline int security_kernel_act_as(struct cred *cred, u32 secid) in security_kernel_act_as() argument [all …]
|
D | lsm_hooks.h | 1423 void (*inode_getsecid)(const struct inode *inode, u32 *secid); 1451 int (*kernel_act_as)(struct cred *new, u32 secid); 1461 void (*task_getsecid)(struct task_struct *p, u32 *secid); 1471 int sig, u32 secid); 1478 void (*ipc_getsecid)(struct kern_ipc_perm *ipcp, u32 *secid); 1515 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen); 1516 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid); 1551 struct sk_buff *skb, u32 *secid); 1555 void (*sk_getsecid)(struct sock *sk, u32 *secid); 1562 int (*secmark_relabel_packet)(u32 secid); [all …]
|
D | audit.h | 482 extern void audit_log_secctx(struct audit_buffer *ab, u32 secid); 484 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument 538 static inline void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument
|
/linux-4.4.14/security/ |
D | security.c | 724 void security_inode_getsecid(const struct inode *inode, u32 *secid) in security_inode_getsecid() argument 726 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid() 877 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument 879 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as() 934 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument 936 *secid = 0; in security_task_getsecid() 937 call_void_hook(task_getsecid, p, secid); in security_task_getsecid() 978 int sig, u32 secid) in security_task_kill() argument 980 return call_int_hook(task_kill, 0, p, info, sig, secid); in security_task_kill() 1016 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() argument [all …]
|
/linux-4.4.14/include/net/ |
D | scm.h | 33 u32 secid; /* Passed security ID */ member 46 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram() 97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
|
D | netlabel.h | 111 u32 secid; member 215 u32 secid; member 372 u32 secid, 466 u32 secid, in netlbl_cfg_unlbl_static_add() argument
|
D | af_unix.h | 36 u32 secid; /* Security ID */ member
|
D | request_sock.h | 67 u32 secid; member
|
/linux-4.4.14/security/selinux/ |
D | xfrm.c | 342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 352 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 355 rc = security_sid_to_context(secid, &ctx_str, &str_len); in selinux_xfrm_state_alloc_acquire() 367 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
D | netlabel.c | 123 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
D | hooks.c | 3185 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument 3188 *secid = isec->sid; in selinux_inode_getsecid() 3602 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument 3608 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as() 3613 tsec->sid = secid; in selinux_kernel_act_as() 3671 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) in selinux_task_getsecid() argument 3673 *secid = task_sid(p); in selinux_task_getsecid() 3722 int sig, u32 secid) in selinux_task_kill() argument 3731 if (secid) in selinux_task_kill() 3732 rc = avc_has_perm(secid, task_sid(p), in selinux_task_kill() [all …]
|
/linux-4.4.14/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 18 __u32 secid; member
|
/linux-4.4.14/kernel/ |
D | cred.c | 652 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument 654 return security_kernel_act_as(new, secid); in set_security_override() 670 u32 secid; in set_security_override_from_ctx() local 673 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx() 677 return set_security_override(new, secid); in set_security_override_from_ctx()
|
D | audit.c | 2032 void audit_log_secctx(struct audit_buffer *ab, u32 secid) in audit_log_secctx() argument 2037 if (security_secid_to_secctx(secid, &secctx, &len)) { in audit_log_secctx()
|
D | signal.c | 1331 const struct cred *cred, u32 secid) in kill_pid_info_as_cred() argument 1350 ret = security_task_kill(p, info, sig, secid); in kill_pid_info_as_cred()
|
/linux-4.4.14/security/smack/ |
D | smack_lsm.c | 1539 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) in smack_inode_getsecid() argument 1543 *secid = isp->smk_inode->smk_secid; in smack_inode_getsecid() 2023 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 2026 struct smack_known *skp = smack_from_secid(secid); in smack_kernel_act_as() 2117 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument 2121 *secid = skp->smk_secid; in smack_task_getsecid() 2207 int sig, u32 secid) in smack_task_kill() argument 2220 if (secid == 0) { in smack_task_kill() 2230 skp = smack_from_secid(secid); in smack_task_kill() 3319 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument [all …]
|
D | smack_access.c | 601 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 607 if (skp->smk_secid == secid) { in smack_from_secid()
|
D | smackfs.c | 199 nap->secid = skp->smk_secid; in smk_netlabel_audit_set()
|
/linux-4.4.14/Documentation/networking/ |
D | secid.txt | 3 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
|
D | 00-INDEX | 193 secid.txt 194 - Explanation of the secid member in flow structures.
|
/linux-4.4.14/security/selinux/include/ |
D | xfrm.h | 22 struct xfrm_sec_ctx *polsec, u32 secid);
|
/linux-4.4.14/drivers/usb/core/ |
D | devio.c | 78 u32 secid; member 94 u32 secid; member 495 u32 secid = 0; in async_completed() local 511 secid = as->secid; in async_completed() 525 kill_pid_info_as_cred(sinfo.si_signo, &sinfo, pid, cred, secid); in async_completed() 919 security_task_getsecid(current, &ps->secid); in usbdev_open() 1556 security_task_getsecid(current, &as->secid); in proc_do_submiturb() 2397 ps->disc_pid, ps->cred, ps->secid); in usbdev_remove()
|
/linux-4.4.14/security/integrity/ima/ |
D | ima.h | 247 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
/linux-4.4.14/net/unix/ |
D | af_unix.c | 143 UNIXCB(skb).secid = scm->secid; in unix_get_secdata() 148 scm->secid = UNIXCB(skb).secid; in unix_set_secdata() 153 return (scm->secid == UNIXCB(skb).secid); in unix_secdata_eq()
|
/linux-4.4.14/net/ipv4/ |
D | ip_sockglue.c | 117 u32 seclen, secid; in ip_cmsg_recv_security() local 120 err = security_socket_getpeersec_dgram(NULL, skb, &secid); in ip_cmsg_recv_security() 124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
|
D | cipso_ipv4.c | 1553 *(u32 *)&buffer[2] = secattr->attr.secid; in cipso_v4_gentag_loc() 1573 secattr->attr.secid = *(u32 *)&tag[2]; in cipso_v4_parsetag_loc()
|
/linux-4.4.14/security/selinux/ss/ |
D | services.c | 3338 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3409 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|