| /security/apparmor/ |
| A D | secid.c | 45 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() argument 47 return xa_load(&aa_secids, secid); in aa_secid_to_label() 80 int apparmor_secid_to_secctx(u32 secid, struct lsm_context *cp) in apparmor_secid_to_secctx() argument 82 struct aa_label *label = aa_secid_to_label(secid); in apparmor_secid_to_secctx() 96 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument 104 *secid = label->secid; in apparmor_secctx_to_secid() 132 ret = __xa_alloc(&aa_secids, &label->secid, label, in aa_alloc_secid() 137 label->secid = AA_SECID_INVALID; in aa_alloc_secid() 148 void aa_free_secid(u32 secid) in aa_free_secid() argument 153 __xa_erase(&aa_secids, secid); in aa_free_secid()
|
| A D | net.c | 343 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 354 secmark->secid = label->secid; in apparmor_secmark_init() 359 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument 370 if (!rules->secmark[i].secid) { in aa_secmark_perm() 376 if (rules->secmark[i].secid == secid || in aa_secmark_perm() 377 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 394 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument 400 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
|
| A D | Makefile | 8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o \
|
| A D | label.c | 343 aa_free_secid(label->secid); in aa_label_destroy()
|
| A D | lsm.c | 1610 struct sk_buff *skb, u32 *secid) in apparmor_socket_getpeersec_dgram() argument
|
| /security/apparmor/include/ |
| A D | secid.h | 27 struct aa_label *aa_secid_to_label(u32 secid); 28 int apparmor_secid_to_secctx(u32 secid, struct lsm_context *cp); 30 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 35 void aa_free_secid(u32 secid);
|
| A D | net.h | 81 u32 secid; member 117 u32 secid, const struct sock *sk);
|
| A D | label.h | 134 u32 secid; member
|
| /security/selinux/ |
| A D | xfrm.c | 339 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 349 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 352 rc = security_sid_to_context(secid, &ctx_str, in selinux_xfrm_state_alloc_acquire() 365 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
| A D | netlabel.c | 112 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 291 rc = security_netlbl_sid_to_secattr(asoc->secid, &secattr); in selinux_netlbl_sctp_assoc_request() 339 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
| A D | hooks.c | 4180 *secid = cred_sid(c); in selinux_cred_getsecid() 4203 tsec->sid = secid; in selinux_kernel_act_as() 4442 u32 secid; in selinux_task_kill() local 4450 secid = current_sid(); in selinux_task_kill() 4452 secid = cred_sid(cred); in selinux_task_kill() 5382 *secid = SECSID_NULL; in selinux_socket_getpeersec_dgram() 5393 *secid = peer_secid; in selinux_socket_getpeersec_dgram() 5437 *secid = sksec->sid; in selinux_sk_getsecid() 5538 asoc->secid = conn_sid; in selinux_sctp_assoc_request() 5559 asoc->secid = sksec->sid; in selinux_sctp_assoc_established() [all …]
|
| /security/ |
| A D | security.c | 3304 *secid = 0; in security_cred_getsecid() 3305 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid() 3334 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument 3336 return call_int_hook(kernel_act_as, new, secid); in security_kernel_act_as() 4337 return call_int_hook(secid_to_secctx, secid, cp); in security_secid_to_secctx() 4371 *secid = 0; in security_secctx_to_secid() 4852 struct sk_buff *skb, u32 *secid) in security_socket_getpeersec_dgram() argument 5014 int security_secmark_relabel_packet(u32 secid) in security_secmark_relabel_packet() argument 5016 return call_int_hook(secmark_relabel_packet, secid); in security_secmark_relabel_packet() 5392 struct xfrm_sec_ctx *polsec, u32 secid) in security_xfrm_state_alloc_acquire() argument [all …]
|
| /security/smack/ |
| A D | smack_access.c | 532 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr() 618 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 624 if (skp->smk_secid == secid) { in smack_from_secid()
|
| A D | smack_lsm.c | 2122 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument 2128 *secid = skp->smk_secid; in smack_cred_getsecid() 2154 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 2158 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as() 3995 return smack_from_secid(sap->attr.secid); in smack_from_secattr() 4292 struct sk_buff *skb, u32 *secid) in smack_socket_getpeersec_dgram() argument 4340 *secid = s; in smack_socket_getpeersec_dgram() 4808 static int smack_secid_to_secctx(u32 secid, struct lsm_context *cp) in smack_secid_to_secctx() argument 4810 return smack_to_secctx(smack_from_secid(secid), cp); in smack_secid_to_secctx() 4839 *secid = skp->smk_secid; in smack_secctx_to_secid() [all …]
|
| /security/selinux/include/ |
| A D | xfrm.h | 25 struct xfrm_sec_ctx *polsec, u32 secid);
|
| /security/selinux/ss/ |
| A D | services.c | 3735 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match() 3738 prop->selinux.secid); in selinux_audit_rule_match() 3914 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3990 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|