/security/apparmor/ |
H A D | sid.c | 4 * This file contains AppArmor security identifier (sid) manipulation fns 14 * AppArmor allocates a unique sid for every profile loaded. If a profile 15 * is replaced it receives the sid of the profile it is replacing. 17 * The sid value of 0 is invalid. 24 #include "include/sid.h" 30 /* TODO FIXME: add sid to profile mapping, and sid recycling */ 33 * aa_alloc_sid - allocate a new sid for a profile 37 u32 sid; local 40 * TODO FIXME: sid recyclin 52 aa_free_sid(u32 sid) argument [all...] |
/security/selinux/include/ |
H A D | xfrm.h | 42 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall); 43 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid); 75 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, argument 78 *sid = SECSID_NULL; 86 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) argument 88 *sid = SECSID_NULL;
|
H A D | netlabel.h | 51 u32 *sid); 54 u32 sid); 96 u32 *sid) 99 *sid = SECSID_NULL; 104 u32 sid) 93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument 102 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument
|
H A D | objsec.h | 33 u32 sid; /* current SID */ member in struct:task_security_struct 47 u32 sid; /* SID of this object */ member in struct:inode_security_struct 54 u32 sid; /* SID of open file description */ member in struct:file_security_struct 62 u32 sid; /* SID of file system superblock */ member in struct:superblock_security_struct 73 u32 sid; /* SID of message */ member in struct:msg_security_struct 78 u32 sid; /* SID of IPC resource */ member in struct:ipc_security_struct 84 u32 sid; /* SID for this interface */ member in struct:netif_security_struct 92 u32 sid; /* SID for this node */ member in struct:netnode_security_struct 97 u32 sid; /* SID for this node */ member in struct:netport_security_struct 113 u32 sid; /* SI member in struct:sk_security_struct 119 u32 sid; /* SID for the tun device sockets */ member in struct:tun_security_struct 123 u32 sid; /* SID of key */ member in struct:key_security_struct [all...] |
H A D | security.h | 163 int security_sid_to_context(u32 sid, char **scontext, 166 int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len); 175 u32 *sid); 192 int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid); 215 u32 *sid); 219 u32 *sid); 221 int security_netlbl_sid_to_secattr(u32 sid, 226 u32 *sid) 231 static inline int security_netlbl_sid_to_secattr(u32 sid, argument 238 const char *security_get_initial_sid_context(u32 sid); 224 security_netlbl_secattr_to_sid( struct netlbl_lsm_secattr *secattr, u32 *sid) argument [all...] |
/security/selinux/ss/ |
H A D | sidtab.h | 13 u32 sid; /* security identifier */ member in struct:sidtab_node 35 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context); 36 struct context *sidtab_search(struct sidtab *s, u32 sid); 37 struct context *sidtab_search_force(struct sidtab *s, u32 sid); 40 int (*apply) (u32 sid, 47 u32 *sid);
|
H A D | sidtab.c | 14 #define SIDTAB_HASH(sid) \ 15 (sid & SIDTAB_HASH_MASK) 33 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) argument 43 hvalue = SIDTAB_HASH(sid); 46 while (cur && sid > cur->sid) { 51 if (cur && sid == cur->sid) { 61 newnode->sid = sid; 85 sidtab_search_core(struct sidtab *s, u32 sid, int force) argument 115 sidtab_search(struct sidtab *s, u32 sid) argument 120 sidtab_search_force(struct sidtab *s, u32 sid) argument 125 sidtab_map(struct sidtab *s, int (*apply) (u32 sid, struct context *context, void *args), void *args) argument 201 u32 sid; local [all...] |
H A D | policydb.h | 196 u32 sid[2]; /* SID(s) */ member in struct:ocontext
|
H A D | services.c | 1227 const char *security_get_initial_sid_context(u32 sid) argument 1229 if (unlikely(sid > SECINITSID_NUM)) 1231 return initial_sid_to_string[sid]; 1234 static int security_sid_to_context_core(u32 sid, char **scontext, argument 1245 if (sid <= SECINITSID_NUM) { 1248 *scontext_len = strlen(initial_sid_to_string[sid]) + 1; 1256 strcpy(scontextp, initial_sid_to_string[sid]); 1261 "load_policy on unknown SID %d\n", __func__, sid); 1267 context = sidtab_search_force(&sidtab, sid); 1269 context = sidtab_search(&sidtab, sid); 1294 security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len) argument 1299 security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len) argument 1389 security_context_to_sid_core(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags, int force) argument 1461 security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid, gfp_t gfp) argument 1486 security_context_to_sid_default(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags) argument 1493 security_context_to_sid_force(const char *scontext, u32 scontext_len, u32 *sid) argument 1799 clone_sid(u32 sid, struct context *context, void *arg) argument 2348 u32 *mysids = NULL, *mysids2, sid; local 2454 __security_genfs_sid(const char *fstype, char *path, u16 orig_sclass, u32 *sid) argument 2514 security_genfs_sid(const char *fstype, char *path, u16 orig_sclass, u32 *sid) argument 2725 security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid) argument 3136 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument 3279 security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, u32 sid) argument 3314 security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, u32 *sid) argument 3385 security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) argument [all...] |
/security/selinux/ |
H A D | netnode.c | 191 * @sid: node SID 200 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) argument 209 *sid = node->nsec.sid; 219 addr, sizeof(struct in_addr), sid); 224 addr, sizeof(struct in6_addr), sid); 235 new->nsec.sid = *sid; 253 * @sid: node SID 263 int sel_netnode_sid(void *addr, u16 family, u32 *sid) argument [all...] |
H A D | netport.c | 140 * @sid: port SID 148 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) argument 157 *sid = port->psec.sid; 164 ret = security_port_sid(protocol, pnum, sid); 170 new->psec.sid = *sid; 188 * @sid: port SID 197 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) argument 204 *sid [all...] |
H A D | netif.c | 127 * @sid: interface SID 136 static int sel_netif_sid_slow(struct net *ns, int ifindex, u32 *sid) argument 157 *sid = netif->nsec.sid; 166 ret = security_netif_sid(dev->name, &new->nsec.sid); 174 *sid = new->nsec.sid; 193 * @sid: interface SID 203 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid) argument 210 *sid [all...] |
H A D | netlabel.c | 48 * @sid: the SID 58 u32 *sid) 62 rc = security_netlbl_secattr_to_sid(secattr, sid); 93 rc = security_netlbl_sid_to_secattr(sksec->sid, secattr); 106 * @sid: the SID 114 u32 sid) 123 (secattr->attr.secid == sid)) 189 * selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel 193 * @sid: the SID 204 u32 *sid) 56 selinux_netlbl_sidlookup_cached(struct sk_buff *skb, struct netlbl_lsm_secattr *secattr, u32 *sid) argument 112 selinux_netlbl_sock_getattr( const struct sock *sk, u32 sid) argument 201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument 237 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument [all...] |
H A D | xfrm.c | 111 rc = avc_has_perm(tsec->sid, ctx->ctx_sid, 147 return avc_has_perm(tsec->sid, ctx->ctx_sid, 165 /* Context sid is either set to label or ANY_ASSOC */ 228 u32 *sid, int ckall) 246 *sid = SECSID_NULL; 254 *sid = sid_session; 259 * LSM hook implementation that checks and/or returns the xfrm sid for the 262 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall) argument 265 *sid = SECSID_NULL; 268 return selinux_xfrm_skb_sid_ingress(skb, sid, ckal 227 selinux_xfrm_skb_sid_ingress(struct sk_buff *skb, u32 *sid, int ckall) argument 271 selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) argument [all...] |
H A D | selinuxfs.c | 85 u32 sid = 0; local 90 sid = tsec->sid; 95 return avc_has_perm(sid, SECINITSID_SECURITY, 572 u32 sid, len; local 579 length = security_context_to_sid(buf, size, &sid, GFP_KERNEL); 583 length = security_sid_to_context(sid, &canon, &len); 919 u32 sid, *sids = NULL; local 943 length = security_context_to_sid(con, strlen(con) + 1, &sid, GFP_KERNEL); 947 length = security_get_user_sids(sid, use 1237 u32 sid; local 1498 u32 sid, len; local [all...] |
H A D | hooks.c | 187 tsec->osid = tsec->sid = SECINITSID_KERNEL; 199 return tsec->sid; 207 u32 sid; local 210 sid = cred_sid(__task_cred(task)); 212 return sid; 222 return tsec->sid; 230 u32 sid = current_sid(); local 239 isec->sid = SECINITSID_UNLABELED; 241 isec->task_sid = sid; 280 u32 sid local 369 may_context_mount_sb_relabel(u32 sid, struct superblock_security_struct *sbsec, const struct cred *cred) argument 386 may_context_mount_inode_relabel(u32 sid, struct superblock_security_struct *sbsec, const struct cred *cred) argument 668 u32 sid; local 896 u32 sid = oldsbsec->mntpoint_sid; local 1235 selinux_genfs_get_sid(struct dentry *dentry, u16 tclass, u16 flags, u32 *sid) argument 1272 u32 sid; local 1534 u32 sid, tsid; local 1552 u32 sid = cred_sid(cred); local 1586 u32 sid = task_sid(tsk); local 1601 u32 sid; local 1671 u32 sid = cred_sid(cred); local 1703 u32 sid, newsid; local 1742 u32 sid = task_sid(ctx); local 1759 u32 sid = current_sid(); local 1802 u32 sid = current_sid(); local 1857 u32 sid = cred_sid(cred); local 1963 u32 sid = task_sid(to); local 1999 u32 sid = current_sid(); local 2307 u32 sid, osid; local 2431 u32 osid, sid; local 2603 u32 sid; local 2763 u32 sid, newsid, clen; local 2896 u32 sid; local 2995 u32 newsid, sid = current_sid(); local 3217 u32 sid = current_sid(); local 3373 u32 sid = current_sid(); local 3486 u32 sid = task_sid(tsk); local 3613 u32 sid = current_sid(); local 3637 u32 sid = current_sid(); local 3652 u32 sid; local 3774 u32 sid = task_sid(p); local 3991 selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) argument 4148 u32 sid, node_perm; local 4243 u32 sid, perm; local 4697 selinux_secmark_relabel_packet(u32 sid) argument 4744 u32 sid = current_sid(); local 4786 u32 sid = current_sid(); local 4920 u32 sid; local 5173 u32 sid; local 5221 u32 sid = current_sid(); local 5246 u32 sid = current_sid(); local 5276 u32 sid = current_sid(); local 5320 u32 sid = current_sid(); local 5365 u32 sid = task_sid(target); local 5387 u32 sid = current_sid(); local 5417 u32 sid = current_sid(); local 5479 u32 sid = current_sid(); local 5509 u32 sid = current_sid(); local 5607 u32 sid; local 5655 u32 sid = 0, ptsid; local 5870 u32 sid; local [all...] |
/security/integrity/ima/ |
H A D | ima_policy.c | 191 u32 osid, sid; local 211 security_task_getsecid(tsk, &sid); 212 rc = security_filter_rule_match(sid,
|