/security/selinux/ |
H A D | xfrm.c | 342 * on a secid. 345 struct xfrm_sec_ctx *polsec, u32 secid) 355 if (secid == 0) 358 rc = security_sid_to_context(secid, &ctx_str, &str_len); 370 ctx->ctx_sid = secid; 344 selinux_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument
|
H A D | hooks.c | 3191 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) argument 3194 *secid = isec->sid; 3610 static int selinux_kernel_act_as(struct cred *new, u32 secid) argument 3616 ret = avc_has_perm(sid, secid, 3621 tsec->sid = secid; 3679 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) argument 3681 *secid = task_sid(p); 3748 int sig, u32 secid) 3757 if (secid) 3758 rc = avc_has_perm(secid, task_si 3747 selinux_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument 4557 selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument 4620 selinux_sk_getsecid(struct sock *sk, u32 *secid) argument 5591 selinux_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument 5793 selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument 5798 selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument [all...] |
/security/smack/ |
H A D | smack_access.c | 568 * smack_from_secid - find the Smack label associated with a secid 569 * @secid: an integer that might be associated with a Smack label 574 struct smack_known *smack_from_secid(const u32 secid) argument 580 if (skp->smk_secid == secid) { 588 * of a secid that is not on the list.
|
H A D | smack_lsm.c | 1307 * @secid: where result will be saved 1309 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) argument 1313 *secid = isp->smk_inode->smk_secid; 1781 * @secid: specifies the security ID to be set 1785 static int smack_kernel_act_as(struct cred *new, u32 secid) argument 1788 struct smack_known *skp = smack_from_secid(secid); 1873 * smack_task_getsecid - get the secid of the task 1875 * @secid: where to put the result 1877 * Sets the secid to contain a u32 version of the smack label. 1879 static void smack_task_getsecid(struct task_struct *p, u32 *secid) argument 1983 smack_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument 2980 smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) argument 3626 smack_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument 3961 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument 4021 smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument 4039 smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument [all...] |
/security/integrity/ima/ |
H A D | ima.h | 240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, argument
|
/security/ |
H A D | capability.c | 263 static void cap_inode_getsecid(const struct inode *inode, u32 *secid) argument 265 *secid = 0; 414 static int cap_kernel_act_as(struct cred *new, u32 secid) argument 454 static void cap_task_getsecid(struct task_struct *p, u32 *secid) argument 456 *secid = 0; 486 int sig, u32 secid) 500 static void cap_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument 502 *secid = 0; 689 struct sk_buff *skb, u32 *secid) 707 static void cap_sk_getsecid(struct sock *sk, u32 *secid) argument 485 cap_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument 688 cap_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument 730 cap_secmark_relabel_packet(u32 secid) argument 812 cap_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument 866 cap_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument 871 cap_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument 931 cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument [all...] |
H A D | security.c | 701 void security_inode_getsecid(const struct inode *inode, u32 *secid) argument 703 security_ops->inode_getsecid(inode, secid); 858 int security_kernel_act_as(struct cred *new, u32 secid) argument 860 return security_ops->kernel_act_as(new, secid); 915 void security_task_getsecid(struct task_struct *p, u32 *secid) argument 917 security_ops->task_getsecid(p, secid); 958 int sig, u32 secid) 960 return security_ops->task_kill(p, info, sig, secid); 990 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument 992 security_ops->ipc_getsecid(ipcp, secid); 957 security_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument 1117 security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument 1123 security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument 1247 security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument 1306 security_secmark_relabel_packet(u32 secid) argument 1401 security_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument 1430 security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) argument 1488 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument [all...] |