secid 3111 drivers/android/binder.c u32 secid; secid 3114 drivers/android/binder.c security_task_getsecid(proc->tsk, &secid); secid 3115 drivers/android/binder.c ret = security_secid_to_secctx(secid, &secctx, &secctx_sz); secid 45 drivers/dio/dio-sysfs.c static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL); secid 119 drivers/dio/dio.c u_char prid, secid, i; secid 147 drivers/dio/dio.c secid = DIO_SECID(va); secid 148 drivers/dio/dio.c id = DIO_ENCODE_ID(prid, secid); secid 194 drivers/dio/dio.c u_char prid, secid = 0; /* primary, secondary ID bytes */ secid 234 drivers/dio/dio.c secid = DIO_SECID(va); secid 235 drivers/dio/dio.c dev->id = DIO_ENCODE_ID(prid, secid); secid 243 drivers/dio/dio.c printk(":%02X", secid); secid 1593 include/linux/lsm_hooks.h void (*inode_getsecid)(struct inode *inode, u32 *secid); secid 1626 include/linux/lsm_hooks.h void (*cred_getsecid)(const struct cred *c, u32 *secid); secid 1627 include/linux/lsm_hooks.h int (*kernel_act_as)(struct cred *new, u32 secid); secid 1639 include/linux/lsm_hooks.h void (*task_getsecid)(struct task_struct *p, u32 *secid); secid 1657 include/linux/lsm_hooks.h void (*ipc_getsecid)(struct kern_ipc_perm *ipcp, u32 *secid); secid 1693 include/linux/lsm_hooks.h int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen); secid 1694 include/linux/lsm_hooks.h int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid); secid 1731 include/linux/lsm_hooks.h struct sk_buff *skb, u32 *secid); secid 1735 include/linux/lsm_hooks.h void (*sk_getsecid)(struct sock *sk, u32 *secid); secid 1742 include/linux/lsm_hooks.h int (*secmark_relabel_packet)(u32 secid); secid 1781 include/linux/lsm_hooks.h u32 secid); secid 1789 include/linux/lsm_hooks.h int (*xfrm_decode_session)(struct sk_buff *skb, u32 *secid, int ckall); secid 1806 include/linux/lsm_hooks.h int (*audit_rule_match)(u32 secid, u32 field, u32 op, void *lsmrule); secid 354 include/linux/security.h void security_inode_getsecid(struct inode *inode, u32 *secid); secid 381 include/linux/security.h void security_cred_getsecid(const struct cred *c, u32 *secid); secid 382 include/linux/security.h int security_kernel_act_as(struct cred *new, u32 secid); secid 394 include/linux/security.h void security_task_getsecid(struct task_struct *p, u32 *secid); secid 411 include/linux/security.h void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid); secid 440 include/linux/security.h int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); secid 441 include/linux/security.h int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); secid 868 include/linux/security.h static inline void security_inode_getsecid(struct inode *inode, u32 *secid) secid 870 include/linux/security.h *secid = 0; secid 988 include/linux/security.h static inline int security_kernel_act_as(struct cred *cred, u32 secid) secid 1044 include/linux/security.h static inline void security_task_getsecid(struct task_struct *p, u32 *secid) secid 1046 include/linux/security.h *secid = 0; secid 1117 include/linux/security.h static inline void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) secid 1119 include/linux/security.h *secid = 0; secid 1239 include/linux/security.h static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) secid 1246 include/linux/security.h u32 *secid) secid 1300 include/linux/security.h int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid); secid 1313 include/linux/security.h int security_secmark_relabel_packet(u32 secid); secid 1438 include/linux/security.h static inline int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) secid 1484 include/linux/security.h static inline int security_secmark_relabel_packet(u32 secid) secid 1581 include/linux/security.h struct xfrm_sec_ctx *polsec, u32 secid); secid 1588 include/linux/security.h int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid); secid 1621 include/linux/security.h struct xfrm_sec_ctx *polsec, u32 secid) secid 1646 include/linux/security.h static inline int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) secid 1782 include/linux/security.h int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule); secid 1798 include/linux/security.h static inline int security_audit_rule_match(u32 secid, u32 field, u32 op, secid 39 include/net/af_unix.h u32 secid; /* Security ID */ secid 100 include/net/netlabel.h u32 secid; secid 204 include/net/netlabel.h u32 secid; secid 418 include/net/netlabel.h u32 secid, secid 526 include/net/netlabel.h u32 secid, secid 64 include/net/request_sock.h u32 secid; secid 36 include/net/scm.h u32 secid; /* Passed security ID */ secid 49 include/net/scm.h security_socket_getpeersec_dgram(sock, NULL, &scm->secid); secid 100 include/net/scm.h err = security_secid_to_secctx(scm->secid, &secdata, &seclen); secid 1344 include/net/sctp/structs.h u32 secid; secid 19 include/uapi/linux/netfilter/xt_SECMARK.h __u32 secid; secid 740 kernel/cred.c int set_security_override(struct cred *new, u32 secid) secid 742 kernel/cred.c return security_kernel_act_as(new, secid); secid 758 kernel/cred.c u32 secid; secid 761 kernel/cred.c ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); secid 765 kernel/cred.c return set_security_override(new, secid); secid 1472 net/ipv4/cipso_ipv4.c *(u32 *)&buffer[2] = secattr->attr.secid; secid 1492 net/ipv4/cipso_ipv4.c secattr->attr.secid = *(u32 *)&tag[2]; secid 134 net/ipv4/ip_sockglue.c u32 seclen, secid; secid 137 net/ipv4/ip_sockglue.c err = security_socket_getpeersec_dgram(NULL, skb, &secid); secid 141 net/ipv4/ip_sockglue.c err = security_secid_to_secctx(secid, &secdata, &seclen); secid 610 net/netfilter/nft_meta.c u32 secid; secid 634 net/netfilter/nft_meta.c priv->secid = tmp_secid; secid 644 net/netfilter/nft_meta.c skb->secmark = priv->secid; secid 36 net/netfilter/xt_SECMARK.c secmark = info->secid; secid 51 net/netfilter/xt_SECMARK.c info->secid = 0; secid 54 net/netfilter/xt_SECMARK.c &info->secid); secid 62 net/netfilter/xt_SECMARK.c if (!info->secid) { secid 68 net/netfilter/xt_SECMARK.c err = security_secmark_relabel_packet(info->secid); secid 213 net/netlabel/netlabel_kapi.c u32 secid, secid 233 net/netlabel/netlabel_kapi.c secid, audit_info); secid 69 net/netlabel/netlabel_unlabeled.c u32 secid; secid 77 net/netlabel/netlabel_unlabeled.c u32 secid; secid 233 net/netlabel/netlabel_unlabeled.c u32 secid) secid 245 net/netlabel/netlabel_unlabeled.c entry->secid = secid; secid 273 net/netlabel/netlabel_unlabeled.c u32 secid) secid 289 net/netlabel/netlabel_unlabeled.c entry->secid = secid; secid 368 net/netlabel/netlabel_unlabeled.c u32 secid, secid 410 net/netlabel/netlabel_unlabeled.c ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); secid 423 net/netlabel/netlabel_unlabeled.c ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); secid 440 net/netlabel/netlabel_unlabeled.c if (security_secid_to_secctx(secid, secid 497 net/netlabel/netlabel_unlabeled.c security_secid_to_secctx(entry->secid, secid 558 net/netlabel/netlabel_unlabeled.c security_secid_to_secctx(entry->secid, secid 884 net/netlabel/netlabel_unlabeled.c u32 secid; secid 908 net/netlabel/netlabel_unlabeled.c &secid); secid 913 net/netlabel/netlabel_unlabeled.c dev_name, addr, mask, addr_len, secid, secid 935 net/netlabel/netlabel_unlabeled.c u32 secid; secid 957 net/netlabel/netlabel_unlabeled.c &secid); secid 962 net/netlabel/netlabel_unlabeled.c NULL, addr, mask, addr_len, secid, secid 1074 net/netlabel/netlabel_unlabeled.c u32 secid; secid 1114 net/netlabel/netlabel_unlabeled.c secid = addr4->secid; secid 1128 net/netlabel/netlabel_unlabeled.c secid = addr6->secid; secid 1131 net/netlabel/netlabel_unlabeled.c ret_val = security_secid_to_secctx(secid, &secctx, &secctx_len); secid 1483 net/netlabel/netlabel_unlabeled.c secattr->attr.secid = netlbl_unlhsh_addr4_entry(addr4)->secid; secid 1496 net/netlabel/netlabel_unlabeled.c secattr->attr.secid = netlbl_unlhsh_addr6_entry(addr6)->secid; secid 1534 net/netlabel/netlabel_unlabeled.c security_task_getsecid(current, &audit_info.secid); secid 214 net/netlabel/netlabel_unlabeled.h u32 secid, secid 101 net/netlabel/netlabel_user.c if (audit_info->secid != 0 && secid 102 net/netlabel/netlabel_user.c security_secid_to_secctx(audit_info->secid, secid 37 net/netlabel/netlabel_user.h security_task_getsecid(current, &audit_info->secid); secid 141 net/unix/af_unix.c UNIXCB(skb).secid = scm->secid; secid 146 net/unix/af_unix.c scm->secid = UNIXCB(skb).secid; secid 151 net/unix/af_unix.c return (scm->secid == UNIXCB(skb).secid); secid 132 security/apparmor/include/label.h u32 secid; secid 85 security/apparmor/include/net.h u32 secid; secid 110 security/apparmor/include/net.h u32 secid, struct sock *sk); secid 24 security/apparmor/include/secid.h struct aa_label *aa_secid_to_label(u32 secid); secid 25 security/apparmor/include/secid.h int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); secid 26 security/apparmor/include/secid.h int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); secid 31 security/apparmor/include/secid.h void aa_free_secid(u32 secid); secid 32 security/apparmor/include/secid.h void aa_secid_update(u32 secid, struct aa_label *label); secid 334 security/apparmor/label.c aa_free_secid(label->secid); secid 709 security/apparmor/lsm.c static void apparmor_task_getsecid(struct task_struct *p, u32 *secid) secid 712 security/apparmor/lsm.c *secid = label->secid; secid 1105 security/apparmor/lsm.c struct sk_buff *skb, u32 *secid) secid 195 security/apparmor/net.c secmark->secid = AA_SECID_WILDCARD; secid 206 security/apparmor/net.c secmark->secid = label->secid; secid 211 security/apparmor/net.c static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, secid 221 security/apparmor/net.c if (!profile->secmark[i].secid) { secid 227 security/apparmor/net.c if (profile->secmark[i].secid == secid || secid 228 security/apparmor/net.c profile->secmark[i].secid == AA_SECID_WILDCARD) { secid 245 security/apparmor/net.c u32 secid, struct sock *sk) secid 251 security/apparmor/net.c aa_secmark_perm(profile, request, secid, secid 46 security/apparmor/secid.c void aa_secid_update(u32 secid, struct aa_label *label) secid 51 security/apparmor/secid.c idr_replace(&aa_secids, label, secid); secid 59 security/apparmor/secid.c struct aa_label *aa_secid_to_label(u32 secid) secid 64 security/apparmor/secid.c label = idr_find(&aa_secids, secid); secid 70 security/apparmor/secid.c int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) secid 73 security/apparmor/secid.c struct aa_label *label = aa_secid_to_label(secid); secid 98 security/apparmor/secid.c int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) secid 106 security/apparmor/secid.c *secid = label->secid; secid 136 security/apparmor/secid.c label->secid = AA_SECID_INVALID; secid 141 security/apparmor/secid.c label->secid = ret; secid 149 security/apparmor/secid.c void aa_free_secid(u32 secid) secid 154 security/apparmor/secid.c idr_remove(&aa_secids, secid); secid 208 security/integrity/ima/ima.h int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid, secid 232 security/integrity/ima/ima.h int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid, secid 373 security/integrity/ima/ima.h static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, secid 184 security/integrity/ima/ima_api.c int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid, secid 192 security/integrity/ima/ima_api.c return ima_match_policy(inode, cred, secid, func, mask, flags, pcr, secid 50 security/integrity/ima/ima_appraise.c u32 secid; secid 55 security/integrity/ima/ima_appraise.c security_task_getsecid(current, &secid); secid 56 security/integrity/ima/ima_appraise.c return ima_match_policy(inode, current_cred(), secid, func, mask, secid 193 security/integrity/ima/ima_main.c u32 secid, char *buf, loff_t size, int mask, secid 217 security/integrity/ima/ima_main.c action = ima_get_action(inode, cred, secid, mask, func, &pcr, secid 383 security/integrity/ima/ima_main.c u32 secid; secid 386 security/integrity/ima/ima_main.c security_task_getsecid(current, &secid); secid 387 security/integrity/ima/ima_main.c return process_measurement(file, current_cred(), secid, NULL, secid 410 security/integrity/ima/ima_main.c u32 secid; secid 412 security/integrity/ima/ima_main.c security_task_getsecid(current, &secid); secid 413 security/integrity/ima/ima_main.c ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, secid 418 security/integrity/ima/ima_main.c security_cred_getsecid(bprm->cred, &secid); secid 419 security/integrity/ima/ima_main.c return process_measurement(bprm->file, bprm->cred, secid, NULL, 0, secid 435 security/integrity/ima/ima_main.c u32 secid; secid 437 security/integrity/ima/ima_main.c security_task_getsecid(current, &secid); secid 438 security/integrity/ima/ima_main.c return process_measurement(file, current_cred(), secid, NULL, 0, secid 547 security/integrity/ima/ima_main.c u32 secid; secid 569 security/integrity/ima/ima_main.c security_task_getsecid(current, &secid); secid 570 security/integrity/ima/ima_main.c return process_measurement(file, current_cred(), secid, buf, size, secid 636 security/integrity/ima/ima_main.c const struct cred *cred, u32 secid) secid 654 security/integrity/ima/ima_main.c action = ima_get_action(NULL, cred, secid, 0, KEXEC_CMDLINE, &pcr, secid 689 security/integrity/ima/ima_main.c u32 secid; secid 692 security/integrity/ima/ima_main.c security_task_getsecid(current, &secid); secid 694 security/integrity/ima/ima_main.c current_cred(), secid); secid 370 security/integrity/ima/ima_policy.c const struct cred *cred, u32 secid, secid 436 security/integrity/ima/ima_policy.c rc = security_filter_rule_match(secid, secid 492 security/integrity/ima/ima_policy.c int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid, secid 508 security/integrity/ima/ima_policy.c if (!ima_match_rules(entry, inode, cred, secid, func, mask)) secid 1348 security/security.c void security_inode_getsecid(struct inode *inode, u32 *secid) secid 1350 security/security.c call_void_hook(inode_getsecid, inode, secid); secid 1570 security/security.c void security_cred_getsecid(const struct cred *c, u32 *secid) secid 1572 security/security.c *secid = 0; secid 1573 security/security.c call_void_hook(cred_getsecid, c, secid); secid 1577 security/security.c int security_kernel_act_as(struct cred *new, u32 secid) secid 1579 security/security.c return call_int_hook(kernel_act_as, 0, new, secid); secid 1652 security/security.c void security_task_getsecid(struct task_struct *p, u32 *secid) secid 1654 security/security.c *secid = 0; secid 1655 security/security.c call_void_hook(task_getsecid, p, secid); secid 1735 security/security.c void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) secid 1737 security/security.c *secid = 0; secid 1738 security/security.c call_void_hook(ipc_getsecid, ipcp, secid); secid 1915 security/security.c int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) secid 1917 security/security.c return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata, secid 1922 security/security.c int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) secid 1924 security/security.c *secid = 0; secid 1925 security/security.c return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); secid 2060 security/security.c int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) secid 2063 security/security.c skb, secid); secid 2121 security/security.c int security_secmark_relabel_packet(u32 secid) secid 2123 security/security.c return call_int_hook(secmark_relabel_packet, 0, secid); secid 2260 security/security.c struct xfrm_sec_ctx *polsec, u32 secid) secid 2262 security/security.c return call_int_hook(xfrm_state_alloc_acquire, 0, x, polsec, secid); secid 2305 security/security.c int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) secid 2307 security/security.c return call_int_hook(xfrm_decode_session, 0, skb, secid, 1); secid 2365 security/security.c int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) secid 2367 security/security.c return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); secid 3418 security/selinux/hooks.c static void selinux_inode_getsecid(struct inode *inode, u32 *secid) secid 3421 security/selinux/hooks.c *secid = isec->sid; secid 3916 security/selinux/hooks.c static void selinux_cred_getsecid(const struct cred *c, u32 *secid) secid 3918 security/selinux/hooks.c *secid = cred_sid(c); secid 3925 security/selinux/hooks.c static int selinux_kernel_act_as(struct cred *new, u32 secid) secid 3932 security/selinux/hooks.c sid, secid, secid 3937 security/selinux/hooks.c tsec->sid = secid; secid 4063 security/selinux/hooks.c static void selinux_task_getsecid(struct task_struct *p, u32 *secid) secid 4065 security/selinux/hooks.c *secid = task_sid(p); secid 4146 security/selinux/hooks.c u32 secid; secid 4154 security/selinux/hooks.c secid = current_sid(); secid 4156 security/selinux/hooks.c secid = cred_sid(cred); secid 4158 security/selinux/hooks.c secid, task_sid(p), SECCLASS_PROCESS, perm, NULL); secid 5099 security/selinux/hooks.c static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) secid 5121 security/selinux/hooks.c *secid = peer_secid; secid 5165 security/selinux/hooks.c static void selinux_sk_getsecid(struct sock *sk, u32 *secid) secid 5168 security/selinux/hooks.c *secid = SECINITSID_ANY_SOCKET; secid 5172 security/selinux/hooks.c *secid = sksec->sid; secid 5254 security/selinux/hooks.c ep->secid = conn_sid; secid 5355 security/selinux/hooks.c newsksec->sid = ep->secid; secid 5376 security/selinux/hooks.c req->secid = connsid; secid 5387 security/selinux/hooks.c newsksec->sid = req->secid; secid 5437 security/selinux/hooks.c fl->flowi_secid = req->secid; secid 6282 security/selinux/hooks.c static void selinux_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) secid 6285 security/selinux/hooks.c *secid = isec->sid; secid 6492 security/selinux/hooks.c static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) secid 6494 security/selinux/hooks.c return security_sid_to_context(&selinux_state, secid, secid 6498 security/selinux/hooks.c static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) secid 6501 security/selinux/hooks.c secid, GFP_KERNEL); secid 23 security/selinux/include/xfrm.h struct xfrm_sec_ctx *polsec, u32 secid); secid 110 security/selinux/netlabel.c (secattr->attr.secid == sid)) secid 286 security/selinux/netlabel.c ep->secid, &secattr); secid 333 security/selinux/netlabel.c rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, secid 3602 security/selinux/ss/services.c *sid = secattr->attr.secid; secid 3675 security/selinux/ss/services.c secattr->attr.secid = sid; secid 344 security/selinux/xfrm.c struct xfrm_sec_ctx *polsec, u32 secid) secid 354 security/selinux/xfrm.c if (secid == 0) secid 357 security/selinux/xfrm.c rc = security_sid_to_context(&selinux_state, secid, &ctx_str, secid 370 security/selinux/xfrm.c ctx->ctx_sid = secid; secid 592 security/smack/smack_access.c struct smack_known *smack_from_secid(const u32 secid) secid 598 security/smack/smack_access.c if (skp->smk_secid == secid) { secid 1499 security/smack/smack_lsm.c static void smack_inode_getsecid(struct inode *inode, u32 *secid) secid 1503 security/smack/smack_lsm.c *secid = skp->smk_secid; secid 1988 security/smack/smack_lsm.c static void smack_cred_getsecid(const struct cred *cred, u32 *secid) secid 1994 security/smack/smack_lsm.c *secid = skp->smk_secid; secid 2005 security/smack/smack_lsm.c static int smack_kernel_act_as(struct cred *new, u32 secid) secid 2009 security/smack/smack_lsm.c new_tsp->smk_task = smack_from_secid(secid); secid 2095 security/smack/smack_lsm.c static void smack_task_getsecid(struct task_struct *p, u32 *secid) secid 2099 security/smack/smack_lsm.c *secid = skp->smk_secid; secid 3240 security/smack/smack_lsm.c static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) secid 3245 security/smack/smack_lsm.c *secid = iskp->smk_secid; secid 3767 security/smack/smack_lsm.c return smack_from_secid(sap->attr.secid); secid 3984 security/smack/smack_lsm.c struct sk_buff *skb, u32 *secid) secid 4035 security/smack/smack_lsm.c *secid = s; secid 4392 security/smack/smack_lsm.c static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) secid 4405 security/smack/smack_lsm.c skp = smack_from_secid(secid); secid 4445 security/smack/smack_lsm.c static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) secid 4447 security/smack/smack_lsm.c struct smack_known *skp = smack_from_secid(secid); secid 4463 security/smack/smack_lsm.c static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) secid 4468 security/smack/smack_lsm.c *secid = skp->smk_secid; secid 4470 security/smack/smack_lsm.c *secid = 0; secid 188 security/smack/smackfs.c nap->secid = skp->smk_secid;