Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 25 of 45) sorted by relevance

12

/Linux-v5.4/security/apparmor/
Dsecid.c46 void aa_secid_update(u32 secid, struct aa_label *label) in aa_secid_update() argument
51 idr_replace(&aa_secids, label, secid); in aa_secid_update()
59 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() argument
64 label = idr_find(&aa_secids, secid); in aa_secid_to_label()
70 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument
73 struct aa_label *label = aa_secid_to_label(secid); in apparmor_secid_to_secctx()
98 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument
106 *secid = label->secid; in apparmor_secctx_to_secid()
136 label->secid = AA_SECID_INVALID; in aa_alloc_secid()
141 label->secid = ret; in aa_alloc_secid()
[all …]
Dnet.c195 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
206 secmark->secid = label->secid; in apparmor_secmark_init()
211 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument
221 if (!profile->secmark[i].secid) { in aa_secmark_perm()
227 if (profile->secmark[i].secid == secid || in aa_secmark_perm()
228 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
245 u32 secid, struct sock *sk) in apparmor_secmark_check() argument
251 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
/Linux-v5.4/security/apparmor/include/
Dsecid.h24 struct aa_label *aa_secid_to_label(u32 secid);
25 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
26 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
31 void aa_free_secid(u32 secid);
32 void aa_secid_update(u32 secid, struct aa_label *label);
Dnet.h85 u32 secid; member
110 u32 secid, struct sock *sk);
/Linux-v5.4/security/integrity/ima/
Dima_main.c193 u32 secid, char *buf, loff_t size, int mask, in process_measurement() argument
217 action = ima_get_action(inode, cred, secid, mask, func, &pcr, in process_measurement()
383 u32 secid; in ima_file_mmap() local
386 security_task_getsecid(current, &secid); in ima_file_mmap()
387 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap()
410 u32 secid; in ima_bprm_check() local
412 security_task_getsecid(current, &secid); in ima_bprm_check()
413 ret = process_measurement(bprm->file, current_cred(), secid, NULL, 0, in ima_bprm_check()
418 security_cred_getsecid(bprm->cred, &secid); in ima_bprm_check()
419 return process_measurement(bprm->file, bprm->cred, secid, NULL, 0, in ima_bprm_check()
[all …]
Dima.h208 int ima_get_action(struct inode *inode, const struct cred *cred, u32 secid,
232 int ima_match_policy(struct inode *inode, const struct cred *cred, u32 secid,
373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
Dima_appraise.c50 u32 secid; in ima_must_appraise() local
55 security_task_getsecid(current, &secid); in ima_must_appraise()
56 return ima_match_policy(inode, current_cred(), secid, func, mask, in ima_must_appraise()
/Linux-v5.4/net/netlabel/
Dnetlabel_unlabeled.c69 u32 secid; member
77 u32 secid; member
233 u32 secid) in netlbl_unlhsh_add_addr4() argument
245 entry->secid = secid; in netlbl_unlhsh_add_addr4()
273 u32 secid) in netlbl_unlhsh_add_addr6() argument
289 entry->secid = secid; in netlbl_unlhsh_add_addr6()
368 u32 secid, in netlbl_unlhsh_add() argument
410 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add()
423 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add()
440 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add()
[all …]
Dnetlabel_user.c101 if (audit_info->secid != 0 && in netlbl_audit_start_common()
102 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
Dnetlabel_user.h37 security_task_getsecid(current, &audit_info->secid); in netlbl_netlink_auditinfo()
Dnetlabel_unlabeled.h214 u32 secid,
/Linux-v5.4/net/netfilter/
Dxt_SECMARK.c36 secmark = info->secid; in secmark_tg()
51 info->secid = 0; in checkentry_lsm()
54 &info->secid); in checkentry_lsm()
62 if (!info->secid) { in checkentry_lsm()
68 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
/Linux-v5.4/drivers/dio/
Ddio.c119 u_char prid, secid, i; in dio_find() local
147 secid = DIO_SECID(va); in dio_find()
148 id = DIO_ENCODE_ID(prid, secid); in dio_find()
194 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
234 secid = DIO_SECID(va); in dio_init()
235 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init()
243 printk(":%02X", secid); in dio_init()
/Linux-v5.4/include/linux/
Dsecurity.h352 void security_inode_getsecid(struct inode *inode, u32 *secid);
379 void security_cred_getsecid(const struct cred *c, u32 *secid);
380 int security_kernel_act_as(struct cred *new, u32 secid);
392 void security_task_getsecid(struct task_struct *p, u32 *secid);
409 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid);
438 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
439 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
866 static inline void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() argument
868 *secid = 0; in security_inode_getsecid()
986 static inline int security_kernel_act_as(struct cred *cred, u32 secid) in security_kernel_act_as() argument
[all …]
Dlsm_hooks.h1593 void (*inode_getsecid)(struct inode *inode, u32 *secid);
1626 void (*cred_getsecid)(const struct cred *c, u32 *secid);
1627 int (*kernel_act_as)(struct cred *new, u32 secid);
1639 void (*task_getsecid)(struct task_struct *p, u32 *secid);
1657 void (*ipc_getsecid)(struct kern_ipc_perm *ipcp, u32 *secid);
1693 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
1694 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
1731 struct sk_buff *skb, u32 *secid);
1735 void (*sk_getsecid)(struct sock *sk, u32 *secid);
1742 int (*secmark_relabel_packet)(u32 secid);
[all …]
/Linux-v5.4/security/
Dsecurity.c1348 void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() argument
1350 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid()
1570 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument
1572 *secid = 0; in security_cred_getsecid()
1573 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid()
1577 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
1579 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as()
1652 void security_task_getsecid(struct task_struct *p, u32 *secid) in security_task_getsecid() argument
1654 *secid = 0; in security_task_getsecid()
1655 call_void_hook(task_getsecid, p, secid); in security_task_getsecid()
[all …]
/Linux-v5.4/include/net/
Dscm.h36 u32 secid; /* Passed security ID */ member
49 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
100 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
Dnetlabel.h100 u32 secid; member
204 u32 secid; member
418 u32 secid,
526 u32 secid, in netlbl_cfg_unlbl_static_add() argument
/Linux-v5.4/security/selinux/
Dxfrm.c344 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
354 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
357 rc = security_sid_to_context(&selinux_state, secid, &ctx_str, in selinux_xfrm_state_alloc_acquire()
370 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
Dnetlabel.c110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
286 ep->secid, &secattr); in selinux_netlbl_sctp_assoc_request()
333 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, in selinux_netlbl_inet_conn_request()
/Linux-v5.4/include/uapi/linux/netfilter/
Dxt_SECMARK.h19 __u32 secid; member
/Linux-v5.4/kernel/
Dcred.c740 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
742 return security_kernel_act_as(new, secid); in set_security_override()
758 u32 secid; in set_security_override_from_ctx() local
761 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
765 return set_security_override(new, secid); in set_security_override_from_ctx()
/Linux-v5.4/security/smack/
Dsmack_lsm.c1501 static void smack_inode_getsecid(struct inode *inode, u32 *secid) in smack_inode_getsecid() argument
1505 *secid = skp->smk_secid; in smack_inode_getsecid()
1990 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument
1996 *secid = skp->smk_secid; in smack_cred_getsecid()
2007 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
2011 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as()
2097 static void smack_task_getsecid(struct task_struct *p, u32 *secid) in smack_task_getsecid() argument
2101 *secid = skp->smk_secid; in smack_task_getsecid()
3252 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() argument
3257 *secid = iskp->smk_secid; in smack_ipc_getsecid()
[all …]
/Linux-v5.4/Documentation/networking/
Dsecid.txt3 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
/Linux-v5.4/security/selinux/include/
Dxfrm.h23 struct xfrm_sec_ctx *polsec, u32 secid);

12