Searched refs:secid (Results 1 - 10 of 10) sorted by relevance

/security/
H A Dsecurity.c701 void security_inode_getsecid(const struct inode *inode, u32 *secid) argument
703 security_ops->inode_getsecid(inode, secid);
858 int security_kernel_act_as(struct cred *new, u32 secid) argument
860 return security_ops->kernel_act_as(new, secid);
915 void security_task_getsecid(struct task_struct *p, u32 *secid) argument
917 security_ops->task_getsecid(p, secid);
958 int sig, u32 secid)
960 return security_ops->task_kill(p, info, sig, secid);
990 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument
992 security_ops->ipc_getsecid(ipcp, secid);
957 security_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument
1117 security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument
1123 security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument
1247 security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument
1306 security_secmark_relabel_packet(u32 secid) argument
1401 security_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument
1430 security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) argument
1488 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
[all...]
H A Dcapability.c263 static void cap_inode_getsecid(const struct inode *inode, u32 *secid) argument
265 *secid = 0;
414 static int cap_kernel_act_as(struct cred *new, u32 secid) argument
454 static void cap_task_getsecid(struct task_struct *p, u32 *secid) argument
456 *secid = 0;
486 int sig, u32 secid)
500 static void cap_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument
502 *secid = 0;
689 struct sk_buff *skb, u32 *secid)
707 static void cap_sk_getsecid(struct sock *sk, u32 *secid) argument
485 cap_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument
688 cap_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument
730 cap_secmark_relabel_packet(u32 secid) argument
812 cap_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument
866 cap_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument
871 cap_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument
931 cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
[all...]
/security/selinux/include/
H A Dxfrm.h22 struct xfrm_sec_ctx *polsec, u32 secid);
/security/selinux/
H A Dxfrm.c342 * on a secid.
345 struct xfrm_sec_ctx *polsec, u32 secid)
355 if (secid == 0)
358 rc = security_sid_to_context(secid, &ctx_str, &str_len);
370 ctx->ctx_sid = secid;
344 selinux_xfrm_state_alloc_acquire(struct xfrm_state *x, struct xfrm_sec_ctx *polsec, u32 secid) argument
H A Dnetlabel.c123 (secattr->attr.secid == sid))
291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr);
H A Dhooks.c3191 static void selinux_inode_getsecid(const struct inode *inode, u32 *secid) argument
3194 *secid = isec->sid;
3610 static int selinux_kernel_act_as(struct cred *new, u32 secid) argument
3616 ret = avc_has_perm(sid, secid,
3621 tsec->sid = secid;
3679 static void selinux_task_getsecid(struct task_struct *p, u32 *secid) argument
3681 *secid = task_sid(p);
3748 int sig, u32 secid)
3757 if (secid)
3758 rc = avc_has_perm(secid, task_si
3747 selinux_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument
4557 selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument
4620 selinux_sk_getsecid(struct sock *sk, u32 *secid) argument
5591 selinux_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) argument
5793 selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument
5798 selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument
[all...]
/security/smack/
H A Dsmack_lsm.c1307 * @secid: where result will be saved
1309 static void smack_inode_getsecid(const struct inode *inode, u32 *secid) argument
1313 *secid = isp->smk_inode->smk_secid;
1781 * @secid: specifies the security ID to be set
1785 static int smack_kernel_act_as(struct cred *new, u32 secid) argument
1788 struct smack_known *skp = smack_from_secid(secid);
1873 * smack_task_getsecid - get the secid of the task
1875 * @secid: where to put the result
1877 * Sets the secid to contain a u32 version of the smack label.
1879 static void smack_task_getsecid(struct task_struct *p, u32 *secid) argument
1983 smack_task_kill(struct task_struct *p, struct siginfo *info, int sig, u32 secid) argument
2980 smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) argument
3626 smack_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) argument
3961 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
4021 smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) argument
4039 smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) argument
[all...]
H A Dsmackfs.c83 * secid is contained directly in the category set.
191 nap->secid = skp->smk_secid;
/security/integrity/ima/
H A Dima.h240 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, argument
/security/selinux/ss/
H A Dservices.c3331 *sid = secattr->attr.secid;
3406 secattr->attr.secid = sid;

Completed in 794 milliseconds