Searched defs:sid (Results 1 - 17 of 17) sorted by relevance

/security/apparmor/
H A Dsid.c4 * This file contains AppArmor security identifier (sid) manipulation fns
14 * AppArmor allocates a unique sid for every profile loaded. If a profile
15 * is replaced it receives the sid of the profile it is replacing.
17 * The sid value of 0 is invalid.
24 #include "include/sid.h"
30 /* TODO FIXME: add sid to profile mapping, and sid recycling */
33 * aa_alloc_sid - allocate a new sid for a profile
37 u32 sid; local
40 * TODO FIXME: sid recyclin
52 aa_free_sid(u32 sid) argument
[all...]
/security/selinux/include/
H A Dxfrm.h42 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
43 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
75 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, argument
78 *sid = SECSID_NULL;
86 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) argument
88 *sid = SECSID_NULL;
H A Dnetlabel.h51 u32 *sid);
54 u32 sid);
96 u32 *sid)
99 *sid = SECSID_NULL;
104 u32 sid)
93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
102 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument
H A Dobjsec.h33 u32 sid; /* current SID */ member in struct:task_security_struct
47 u32 sid; /* SID of this object */ member in struct:inode_security_struct
54 u32 sid; /* SID of open file description */ member in struct:file_security_struct
62 u32 sid; /* SID of file system superblock */ member in struct:superblock_security_struct
73 u32 sid; /* SID of message */ member in struct:msg_security_struct
78 u32 sid; /* SID of IPC resource */ member in struct:ipc_security_struct
84 u32 sid; /* SID for this interface */ member in struct:netif_security_struct
92 u32 sid; /* SID for this node */ member in struct:netnode_security_struct
97 u32 sid; /* SID for this node */ member in struct:netport_security_struct
113 u32 sid; /* SI member in struct:sk_security_struct
119 u32 sid; /* SID for the tun device sockets */ member in struct:tun_security_struct
123 u32 sid; /* SID of key */ member in struct:key_security_struct
[all...]
H A Dsecurity.h163 int security_sid_to_context(u32 sid, char **scontext,
166 int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
175 u32 *sid);
192 int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
215 u32 *sid);
219 u32 *sid);
221 int security_netlbl_sid_to_secattr(u32 sid,
226 u32 *sid)
231 static inline int security_netlbl_sid_to_secattr(u32 sid, argument
238 const char *security_get_initial_sid_context(u32 sid);
224 security_netlbl_secattr_to_sid( struct netlbl_lsm_secattr *secattr, u32 *sid) argument
[all...]
/security/selinux/ss/
H A Dsidtab.h13 u32 sid; /* security identifier */ member in struct:sidtab_node
35 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context);
36 struct context *sidtab_search(struct sidtab *s, u32 sid);
37 struct context *sidtab_search_force(struct sidtab *s, u32 sid);
40 int (*apply) (u32 sid,
47 u32 *sid);
H A Dsidtab.c14 #define SIDTAB_HASH(sid) \
15 (sid & SIDTAB_HASH_MASK)
33 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) argument
43 hvalue = SIDTAB_HASH(sid);
46 while (cur && sid > cur->sid) {
51 if (cur && sid == cur->sid) {
61 newnode->sid = sid;
85 sidtab_search_core(struct sidtab *s, u32 sid, int force) argument
115 sidtab_search(struct sidtab *s, u32 sid) argument
120 sidtab_search_force(struct sidtab *s, u32 sid) argument
125 sidtab_map(struct sidtab *s, int (*apply) (u32 sid, struct context *context, void *args), void *args) argument
201 u32 sid; local
[all...]
H A Dpolicydb.h196 u32 sid[2]; /* SID(s) */ member in struct:ocontext
H A Dservices.c1227 const char *security_get_initial_sid_context(u32 sid) argument
1229 if (unlikely(sid > SECINITSID_NUM))
1231 return initial_sid_to_string[sid];
1234 static int security_sid_to_context_core(u32 sid, char **scontext, argument
1245 if (sid <= SECINITSID_NUM) {
1248 *scontext_len = strlen(initial_sid_to_string[sid]) + 1;
1256 strcpy(scontextp, initial_sid_to_string[sid]);
1261 "load_policy on unknown SID %d\n", __func__, sid);
1267 context = sidtab_search_force(&sidtab, sid);
1269 context = sidtab_search(&sidtab, sid);
1294 security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len) argument
1299 security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len) argument
1389 security_context_to_sid_core(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags, int force) argument
1461 security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid, gfp_t gfp) argument
1486 security_context_to_sid_default(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags) argument
1493 security_context_to_sid_force(const char *scontext, u32 scontext_len, u32 *sid) argument
1799 clone_sid(u32 sid, struct context *context, void *arg) argument
2348 u32 *mysids = NULL, *mysids2, sid; local
2454 __security_genfs_sid(const char *fstype, char *path, u16 orig_sclass, u32 *sid) argument
2514 security_genfs_sid(const char *fstype, char *path, u16 orig_sclass, u32 *sid) argument
2725 security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid) argument
3136 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
3279 security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, u32 sid) argument
3314 security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, u32 *sid) argument
3385 security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) argument
[all...]
/security/selinux/
H A Dnetnode.c191 * @sid: node SID
200 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) argument
209 *sid = node->nsec.sid;
219 addr, sizeof(struct in_addr), sid);
224 addr, sizeof(struct in6_addr), sid);
235 new->nsec.sid = *sid;
253 * @sid: node SID
263 int sel_netnode_sid(void *addr, u16 family, u32 *sid) argument
[all...]
H A Dnetport.c140 * @sid: port SID
148 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) argument
157 *sid = port->psec.sid;
164 ret = security_port_sid(protocol, pnum, sid);
170 new->psec.sid = *sid;
188 * @sid: port SID
197 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) argument
204 *sid
[all...]
H A Dnetif.c127 * @sid: interface SID
136 static int sel_netif_sid_slow(struct net *ns, int ifindex, u32 *sid) argument
157 *sid = netif->nsec.sid;
166 ret = security_netif_sid(dev->name, &new->nsec.sid);
174 *sid = new->nsec.sid;
193 * @sid: interface SID
203 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid) argument
210 *sid
[all...]
H A Dnetlabel.c48 * @sid: the SID
58 u32 *sid)
62 rc = security_netlbl_secattr_to_sid(secattr, sid);
93 rc = security_netlbl_sid_to_secattr(sksec->sid, secattr);
106 * @sid: the SID
114 u32 sid)
123 (secattr->attr.secid == sid))
189 * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel
193 * @sid: the SID
204 u32 *sid)
56 selinux_netlbl_sidlookup_cached(struct sk_buff *skb, struct netlbl_lsm_secattr *secattr, u32 *sid) argument
112 selinux_netlbl_sock_getattr( const struct sock *sk, u32 sid) argument
201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
237 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument
[all...]
H A Dxfrm.c111 rc = avc_has_perm(tsec->sid, ctx->ctx_sid,
147 return avc_has_perm(tsec->sid, ctx->ctx_sid,
165 /* Context sid is either set to label or ANY_ASSOC */
228 u32 *sid, int ckall)
246 *sid = SECSID_NULL;
254 *sid = sid_session;
259 * LSM hook implementation that checks and/or returns the xfrm sid for the
262 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall) argument
265 *sid = SECSID_NULL;
268 return selinux_xfrm_skb_sid_ingress(skb, sid, ckal
227 selinux_xfrm_skb_sid_ingress(struct sk_buff *skb, u32 *sid, int ckall) argument
271 selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) argument
[all...]
H A Dselinuxfs.c85 u32 sid = 0; local
90 sid = tsec->sid;
95 return avc_has_perm(sid, SECINITSID_SECURITY,
572 u32 sid, len; local
579 length = security_context_to_sid(buf, size, &sid, GFP_KERNEL);
583 length = security_sid_to_context(sid, &canon, &len);
919 u32 sid, *sids = NULL; local
943 length = security_context_to_sid(con, strlen(con) + 1, &sid, GFP_KERNEL);
947 length = security_get_user_sids(sid, use
1237 u32 sid; local
1498 u32 sid, len; local
[all...]
H A Dhooks.c187 tsec->osid = tsec->sid = SECINITSID_KERNEL;
199 return tsec->sid;
207 u32 sid; local
210 sid = cred_sid(__task_cred(task));
212 return sid;
222 return tsec->sid;
230 u32 sid = current_sid(); local
239 isec->sid = SECINITSID_UNLABELED;
241 isec->task_sid = sid;
280 u32 sid local
369 may_context_mount_sb_relabel(u32 sid, struct superblock_security_struct *sbsec, const struct cred *cred) argument
386 may_context_mount_inode_relabel(u32 sid, struct superblock_security_struct *sbsec, const struct cred *cred) argument
668 u32 sid; local
896 u32 sid = oldsbsec->mntpoint_sid; local
1235 selinux_genfs_get_sid(struct dentry *dentry, u16 tclass, u16 flags, u32 *sid) argument
1272 u32 sid; local
1534 u32 sid, tsid; local
1552 u32 sid = cred_sid(cred); local
1586 u32 sid = task_sid(tsk); local
1601 u32 sid; local
1671 u32 sid = cred_sid(cred); local
1703 u32 sid, newsid; local
1742 u32 sid = task_sid(ctx); local
1759 u32 sid = current_sid(); local
1802 u32 sid = current_sid(); local
1857 u32 sid = cred_sid(cred); local
1963 u32 sid = task_sid(to); local
1999 u32 sid = current_sid(); local
2307 u32 sid, osid; local
2431 u32 osid, sid; local
2603 u32 sid; local
2763 u32 sid, newsid, clen; local
2896 u32 sid; local
2995 u32 newsid, sid = current_sid(); local
3217 u32 sid = current_sid(); local
3373 u32 sid = current_sid(); local
3486 u32 sid = task_sid(tsk); local
3613 u32 sid = current_sid(); local
3637 u32 sid = current_sid(); local
3652 u32 sid; local
3774 u32 sid = task_sid(p); local
3991 selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) argument
4148 u32 sid, node_perm; local
4243 u32 sid, perm; local
4697 selinux_secmark_relabel_packet(u32 sid) argument
4744 u32 sid = current_sid(); local
4786 u32 sid = current_sid(); local
4920 u32 sid; local
5173 u32 sid; local
5221 u32 sid = current_sid(); local
5246 u32 sid = current_sid(); local
5276 u32 sid = current_sid(); local
5320 u32 sid = current_sid(); local
5365 u32 sid = task_sid(target); local
5387 u32 sid = current_sid(); local
5417 u32 sid = current_sid(); local
5479 u32 sid = current_sid(); local
5509 u32 sid = current_sid(); local
5607 u32 sid; local
5655 u32 sid = 0, ptsid; local
5870 u32 sid; local
[all...]
/security/integrity/ima/
H A Dima_policy.c191 u32 osid, sid; local
211 security_task_getsecid(tsk, &sid);
212 rc = security_filter_rule_match(sid,

Completed in 182 milliseconds