| /linux/net/netfilter/ |
| H A D | xt_SECMARK.c | 33 secmark = info->secid; in secmark_tg() 48 info->secid = 0; in checkentry_lsm() 51 &info->secid); in checkentry_lsm() 59 if (!info->secid) { in checkentry_lsm() 65 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm() 129 info->secid = newinfo.secid; in secmark_tg_check_v0() 139 .secid = info->secid, in secmark_tg_v0() 175 .usersize = offsetof(struct xt_secmark_target_info_v1, secid), 197 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
|
| H A D | nft_meta.c | 908 u32 secid; member 932 priv->secid = tmp_secid; in nft_secmark_compute_secid() 942 skb->secmark = priv->secid; in nft_secmark_obj_eval()
|
| /linux/net/netlabel/ |
| H A D | netlabel_unlabeled.c | 69 u32 secid; member 77 u32 secid; member 234 u32 secid) in netlbl_unlhsh_add_addr4() argument 246 entry->secid = secid; in netlbl_unlhsh_add_addr4() 274 u32 secid) in netlbl_unlhsh_add_addr6() argument 290 entry->secid = secid; in netlbl_unlhsh_add_addr6() 369 u32 secid, in netlbl_unlhsh_add() argument 410 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); in netlbl_unlhsh_add() 423 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); in netlbl_unlhsh_add() 440 if (security_secid_to_secctx(secid, &ctx) >= 0) { in netlbl_unlhsh_add() [all …]
|
| H A D | netlabel_unlabeled.h | 214 u32 secid,
|
| /linux/drivers/dio/ |
| H A D | dio.c | 124 u_char prid, secid, i; in dio_find() local 153 secid = DIO_SECID(va); in dio_find() 154 id = DIO_ENCODE_ID(prid, secid); in dio_find() 199 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local 244 secid = DIO_SECID(va); in dio_init() 245 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init() 253 printk(":%02X", secid); in dio_init()
|
| H A D | dio-sysfs.c | 45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
|
| /linux/security/apparmor/ |
| H A D | net.c | 345 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 356 secmark->secid = label->secid; in apparmor_secmark_init() 361 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument 372 if (!rules->secmark[i].secid) { in aa_secmark_perm() 378 if (rules->secmark[i].secid == secid || in aa_secmark_perm() 379 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 396 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument 402 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
|
| H A D | Makefile | 8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o \
|
| /linux/include/uapi/linux/netfilter/ |
| H A D | xt_SECMARK.h | 19 __u32 secid; member 26 __u32 secid; member
|
| /linux/security/selinux/ |
| H A D | xfrm.c | 339 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument 349 if (secid == 0) in selinux_xfrm_state_alloc_acquire() 352 rc = security_sid_to_context(secid, &ctx_str, in selinux_xfrm_state_alloc_acquire() 365 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
|
| H A D | netlabel.c | 112 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr() 291 rc = security_netlbl_sid_to_secattr(asoc->secid, &secattr); in selinux_netlbl_sctp_assoc_request() 339 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
|
| H A D | hooks.c | 3679 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop() 3697 crsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up() 4208 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() argument 4210 *secid = cred_sid(c); in selinux_cred_getsecid() 4215 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop() 4222 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument 4228 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as() 4233 crsec->sid = secid; in selinux_kernel_act_as() 4394 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj() 4400 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj() [all …]
|
| /linux/fs/cachefiles/ |
| H A D | security.c | 21 _enter("{%u}", cache->have_secid ? cache->secid : 0); in cachefiles_get_security_ID() 30 ret = set_security_override(new, cache->secid); in cachefiles_get_security_ID()
|
| /linux/Documentation/networking/ |
| H A D | secid.rst | 4 LSM/SeLinux secid 9 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
|
| /linux/include/linux/ |
| H A D | lsm_hook_defs.h | 222 LSM_HOOK(void, LSM_RET_VOID, cred_getsecid, const struct cred *c, u32 *secid) 225 LSM_HOOK(int, 0, kernel_act_as, struct cred *new, u32 secid) 300 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, struct lsm_context *cp) 303 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid) 347 struct sk_buff *skb, u32 *secid) 352 LSM_HOOK(void, LSM_RET_VOID, sk_getsecid, const struct sock *sk, u32 *secid) 360 LSM_HOOK(int, 0, secmark_relabel_packet, u32 secid) 399 struct xfrm_sec_ctx *polsec, u32 secid) 405 LSM_HOOK(int, 0, xfrm_decode_session, struct sk_buff *skb, u32 *secid,
|
| /linux/kernel/ |
| H A D | cred.c | 612 * @secid: The LSM security ID to set 617 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument 619 return security_kernel_act_as(new, secid); in set_security_override() 635 u32 secid; set_security_override_from_ctx() local
|
| /linux/include/net/ |
| H A D | scm.h | 49 u32 secid; /* Passed security ID */ member 62 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
|
| H A D | netlabel.h | 203 u32 secid; member 422 u32 secid, 532 u32 secid, in netlbl_cfg_unlbl_static_add() argument
|
| /linux/security/ |
| H A D | security.c | 2787 * security_cred_getsecid() - Get the secid from a set of credentials 2789 * @secid: secid value 2792 * failure, @secid will be set to zero. 2794 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument 2796 *secid = 0; in security_cred_getsecid() 2797 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid() 2817 * security_kernel_act_as() - Set the kernel credentials to act as secid 2819 * @secid: secid 2826 security_kernel_act_as(struct cred * new,u32 secid) security_kernel_act_as() argument 3827 security_secid_to_secctx(u32 secid,struct lsm_context * cp) security_secid_to_secctx() argument 3875 security_secctx_to_secid(const char * secdata,u32 seclen,u32 * secid) security_secctx_to_secid() argument 4358 security_socket_getpeersec_dgram(struct socket * sock,struct sk_buff * skb,u32 * secid) security_socket_getpeersec_dgram() argument 4520 security_secmark_relabel_packet(u32 secid) security_secmark_relabel_packet() argument 4898 security_xfrm_state_alloc_acquire(struct xfrm_state * x,struct xfrm_sec_ctx * polsec,u32 secid) security_xfrm_state_alloc_acquire() argument 4987 security_xfrm_decode_session(struct sk_buff * skb,u32 * secid) security_xfrm_decode_session() argument [all...] |
| /linux/security/apparmor/include/ |
| H A D | net.h | 81 u32 secid; member 117 u32 secid, const struct sock *sk);
|
| /linux/security/smack/ |
| H A D | smack_access.c | 551 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr() 670 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument 676 if (skp->smk_secid == secid) { in smack_from_secid()
|
| H A D | smack_lsm.c | 2169 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument 2175 *secid = skp->smk_secid; in smack_cred_getsecid() 2201 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument 2205 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as() 4088 return smack_from_secid(sap->attr.secid); in smack_from_secattr() 4385 struct sk_buff *skb, u32 *secid) in smack_socket_getpeersec_dgram() argument 4433 *secid = s; in smack_socket_getpeersec_dgram() 4901 static int smack_secid_to_secctx(u32 secid, struct lsm_context *cp) in smack_secid_to_secctx() argument 4903 return smack_to_secctx(smack_from_secid(secid), cp); in smack_secid_to_secctx() 4927 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument [all …]
|
| /linux/net/unix/ |
| H A D | af_unix.h | 19 u32 secid; /* Security ID */ member
|
| /linux/security/selinux/include/ |
| H A D | xfrm.h | 25 struct xfrm_sec_ctx *polsec, u32 secid);
|
| /linux/Documentation/translations/zh_CN/networking/ |
| H A D | index.rst | 128 * secid
|