/Linux-v6.6/security/apparmor/ |
D | secid.c | 47 void aa_secid_update(u32 secid, struct aa_label *label) in aa_secid_update() argument 52 __xa_store(&aa_secids, secid, label, 0); in aa_secid_update() 59 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() argument 61 return xa_load(&aa_secids, secid); in aa_secid_to_label() 64 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument 67 struct aa_label *label = aa_secid_to_label(secid); in apparmor_secid_to_secctx() 93 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument 101 *secid = label->secid; in apparmor_secctx_to_secid() 125 ret = __xa_alloc(&aa_secids, &label->secid, label, in aa_alloc_secid() 130 label->secid = AA_SECID_INVALID; in aa_alloc_secid() [all …]
|
D | net.c | 200 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 211 secmark->secid = label->secid; in apparmor_secmark_init() 216 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument 228 if (!rules->secmark[i].secid) { in aa_secmark_perm() 234 if (rules->secmark[i].secid == secid || in aa_secmark_perm() 235 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 252 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument 258 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
|
/Linux-v6.6/net/netfilter/ |
D | xt_SECMARK.c | 33 secmark = info->secid; in secmark_tg() 48 info->secid = 0; in checkentry_lsm() 51 &info->secid); in checkentry_lsm() 59 if (!info->secid) { in checkentry_lsm() 65 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm() 129 info->secid = newinfo.secid; in secmark_tg_check_v0() 139 .secid = info->secid, in secmark_tg_v0() 175 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
|
/Linux-v6.6/security/apparmor/include/ |
D | secid.h | 27 struct aa_label *aa_secid_to_label(u32 secid); 28 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 29 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 34 void aa_free_secid(u32 secid); 35 void aa_secid_update(u32 secid, struct aa_label *label);
|
D | net.h | 86 u32 secid; member 111 u32 secid, const struct sock *sk);
|
/Linux-v6.6/security/integrity/ima/ |
D | ima_main.c | 207 u32 secid, char *buf, loff_t size, int mask, in process_measurement() argument 232 action = ima_get_action(file_mnt_idmap(file), inode, cred, secid, in process_measurement() 419 u32 secid; in ima_file_mmap() local 425 security_current_getsecid_subj(&secid); in ima_file_mmap() 428 ret = process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap() 435 return process_measurement(file, current_cred(), secid, NULL, in ima_file_mmap() 464 u32 secid; in ima_file_mprotect() local 472 security_current_getsecid_subj(&secid); in ima_file_mprotect() 475 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 478 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() [all …]
|
D | ima.h | 259 const struct cred *cred, u32 secid, int mask, 290 const struct cred *cred, u32 secid, enum ima_hooks func, 442 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
|
/Linux-v6.6/net/netlabel/ |
D | netlabel_unlabeled.c | 69 u32 secid; member 77 u32 secid; member 234 u32 secid) in netlbl_unlhsh_add_addr4() argument 246 entry->secid = secid; in netlbl_unlhsh_add_addr4() 274 u32 secid) in netlbl_unlhsh_add_addr6() argument 290 entry->secid = secid; in netlbl_unlhsh_add_addr6() 369 u32 secid, in netlbl_unlhsh_add() argument 411 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add() 424 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add() 441 if (security_secid_to_secctx(secid, in netlbl_unlhsh_add() [all …]
|
D | netlabel_user.c | 101 if (audit_info->secid != 0 && in netlbl_audit_start_common() 102 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
|
D | netlabel_user.h | 35 security_current_getsecid_subj(&audit_info->secid); in netlbl_netlink_auditinfo()
|
D | netlabel_unlabeled.h | 214 u32 secid,
|
/Linux-v6.6/drivers/dio/ |
D | dio.c | 124 u_char prid, secid, i; in dio_find() local 153 secid = DIO_SECID(va); in dio_find() 154 id = DIO_ENCODE_ID(prid, secid); in dio_find() 199 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local 244 secid = DIO_SECID(va); in dio_init() 245 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init() 253 printk(":%02X", secid); in dio_init()
|
/Linux-v6.6/include/linux/ |
D | security.h | 383 void security_inode_getsecid(struct inode *inode, u32 *secid); 411 void security_cred_getsecid(const struct cred *c, u32 *secid); 412 int security_kernel_act_as(struct cred *new, u32 secid); 431 void security_current_getsecid_subj(u32 *secid); 432 void security_task_getsecid_obj(struct task_struct *p, u32 *secid); 450 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid); 479 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 480 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 950 static inline void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() argument 952 *secid = 0; in security_inode_getsecid() [all …]
|
D | lsm_hook_defs.h | 164 LSM_HOOK(void, LSM_RET_VOID, inode_getsecid, struct inode *inode, u32 *secid) 197 LSM_HOOK(void, LSM_RET_VOID, cred_getsecid, const struct cred *c, u32 *secid) 198 LSM_HOOK(int, 0, kernel_act_as, struct cred *new, u32 secid) 216 LSM_HOOK(void, LSM_RET_VOID, current_getsecid_subj, u32 *secid) 218 struct task_struct *p, u32 *secid) 238 u32 *secid) 269 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata, 271 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid) 315 struct sk_buff *skb, u32 *secid) 320 LSM_HOOK(void, LSM_RET_VOID, sk_getsecid, const struct sock *sk, u32 *secid) [all …]
|
/Linux-v6.6/include/uapi/linux/netfilter/ |
D | xt_SECMARK.h | 19 __u32 secid; member 26 __u32 secid; member
|
/Linux-v6.6/security/ |
D | security.c | 2490 void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() argument 2492 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid() 2981 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument 2983 *secid = 0; in security_cred_getsecid() 2984 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid() 2998 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument 3000 return call_int_hook(kernel_act_as, 0, new, secid); in security_kernel_act_as() 3239 void security_current_getsecid_subj(u32 *secid) in security_current_getsecid_subj() argument 3241 *secid = 0; in security_current_getsecid_subj() 3242 call_void_hook(current_getsecid_subj, secid); in security_current_getsecid_subj() [all …]
|
/Linux-v6.6/Documentation/networking/ |
D | secid.rst | 4 LSM/SeLinux secid 9 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
|
/Linux-v6.6/security/selinux/ |
D | xfrm.c | 342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 352 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 355 rc = security_sid_to_context(secid, &ctx_str, in selinux_xfrm_state_alloc_acquire() 368 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
D | netlabel.c | 110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 289 rc = security_netlbl_sid_to_secattr(asoc->secid, &secattr); in selinux_netlbl_sctp_assoc_request() 337 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
D | hooks.c | 3498 static void selinux_inode_getsecid(struct inode *inode, u32 *secid) in selinux_inode_getsecid() argument 3501 *secid = isec->sid; in selinux_inode_getsecid() 3986 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() argument 3988 *secid = cred_sid(c); in selinux_cred_getsecid() 3995 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument 4001 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as() 4006 tsec->sid = secid; in selinux_kernel_act_as() 4126 static void selinux_current_getsecid_subj(u32 *secid) in selinux_current_getsecid_subj() argument 4128 *secid = current_sid(); in selinux_current_getsecid_subj() 4131 static void selinux_task_getsecid_obj(struct task_struct *p, u32 *secid) in selinux_task_getsecid_obj() argument [all …]
|
/Linux-v6.6/include/net/ |
D | scm.h | 37 u32 secid; /* Passed security ID */ member 50 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram() 101 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
|
D | netlabel.h | 100 u32 secid; member 204 u32 secid; member 418 u32 secid, 526 u32 secid, in netlbl_cfg_unlbl_static_add() argument
|
/Linux-v6.6/kernel/ |
D | cred.c | 777 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument 779 return security_kernel_act_as(new, secid); in set_security_override() 795 u32 secid; in set_security_override_from_ctx() local 798 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx() 802 return set_security_override(new, secid); in set_security_override_from_ctx()
|
/Linux-v6.6/security/smack/ |
D | smack_lsm.c | 1621 static void smack_inode_getsecid(struct inode *inode, u32 *secid) in smack_inode_getsecid() argument 1625 *secid = skp->smk_secid; in smack_inode_getsecid() 2111 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument 2117 *secid = skp->smk_secid; in smack_cred_getsecid() 2128 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 2132 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as() 2217 static void smack_current_getsecid_subj(u32 *secid) in smack_current_getsecid_subj() argument 2221 *secid = skp->smk_secid; in smack_current_getsecid_subj() 2231 static void smack_task_getsecid_obj(struct task_struct *p, u32 *secid) in smack_task_getsecid_obj() argument 2235 *secid = skp->smk_secid; in smack_task_getsecid_obj() [all …]
|
D | smack_access.c | 524 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr() 610 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 616 if (skp->smk_secid == secid) { in smack_from_secid()
|