Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 25 of 36) sorted by relevance

12

/linux/net/netfilter/
H A Dxt_SECMARK.c33 secmark = info->secid; in secmark_tg()
48 info->secid = 0; in checkentry_lsm()
51 &info->secid); in checkentry_lsm()
59 if (!info->secid) { in checkentry_lsm()
65 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
129 info->secid = newinfo.secid; in secmark_tg_check_v0()
139 .secid = info->secid, in secmark_tg_v0()
175 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
197 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
H A Dnft_meta.c908 u32 secid; member
932 priv->secid = tmp_secid; in nft_secmark_compute_secid()
942 skb->secmark = priv->secid; in nft_secmark_obj_eval()
/linux/security/apparmor/
H A Dnet.c343 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
354 secmark->secid = label->secid; in apparmor_secmark_init()
359 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument
370 if (!rules->secmark[i].secid) { in aa_secmark_perm()
376 if (rules->secmark[i].secid == secid || in aa_secmark_perm()
377 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
394 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument
400 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
H A DMakefile8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o \
/linux/drivers/dio/
H A Ddio.c124 u_char prid, secid, i; in dio_find() local
153 secid = DIO_SECID(va); in dio_find()
154 id = DIO_ENCODE_ID(prid, secid); in dio_find()
199 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
244 secid = DIO_SECID(va); in dio_init()
245 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init()
253 printk(":%02X", secid); in dio_init()
H A Ddio-sysfs.c45 static DEVICE_ATTR(secid, S_IRUGO, dio_show_secid, NULL);
/linux/include/uapi/linux/netfilter/
H A Dxt_SECMARK.h19 __u32 secid; member
26 __u32 secid; member
/linux/security/selinux/
H A Dxfrm.c339 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
349 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
352 rc = security_sid_to_context(secid, &ctx_str, in selinux_xfrm_state_alloc_acquire()
365 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
H A Dnetlabel.c112 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
291 rc = security_netlbl_sid_to_secattr(asoc->secid, &secattr); in selinux_netlbl_sctp_assoc_request()
339 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
H A Dhooks.c3674 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop()
3692 crsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up()
4203 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() argument
4205 *secid = cred_sid(c); in selinux_cred_getsecid()
4210 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop()
4217 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() argument
4223 ret = avc_has_perm(sid, secid, in selinux_kernel_act_as()
4228 crsec->sid = secid; in selinux_kernel_act_as()
4389 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj()
4395 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj()
[all …]
/linux/fs/cachefiles/
H A Dsecurity.c21 _enter("{%u}", cache->have_secid ? cache->secid : 0); in cachefiles_get_security_ID()
30 ret = set_security_override(new, cache->secid); in cachefiles_get_security_ID()
/linux/Documentation/networking/
H A Dsecid.rst4 LSM/SeLinux secid
9 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
/linux/include/linux/
H A Dsecurity.h497 void security_cred_getsecid(const struct cred *c, u32 *secid);
499 int security_kernel_act_as(struct cred *new, u32 secid);
568 int security_secid_to_secctx(u32 secid, struct lsm_context *cp);
571 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
1246 static inline void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument
1248 *secid = 0; in security_cred_getsecid()
1255 static inline int security_kernel_act_as(struct cred *cred, u32 secid) in security_kernel_act_as() argument
1548 static inline int security_secid_to_secctx(u32 secid, struct lsm_context *cp) in security_secid_to_secctx() argument
1562 u32 *secid) in security_secctx_to_secid() argument
1663 int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid);
[all …]
H A Dlsm_hook_defs.h222 LSM_HOOK(void, LSM_RET_VOID, cred_getsecid, const struct cred *c, u32 *secid)
225 LSM_HOOK(int, 0, kernel_act_as, struct cred *new, u32 secid)
300 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, struct lsm_context *cp)
303 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid)
347 struct sk_buff *skb, u32 *secid)
352 LSM_HOOK(void, LSM_RET_VOID, sk_getsecid, const struct sock *sk, u32 *secid)
360 LSM_HOOK(int, 0, secmark_relabel_packet, u32 secid)
399 struct xfrm_sec_ctx *polsec, u32 secid)
405 LSM_HOOK(int, 0, xfrm_decode_session, struct sk_buff *skb, u32 *secid,
/linux/kernel/
H A Dcred.c617 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
619 return security_kernel_act_as(new, secid); in set_security_override()
635 u32 secid; in set_security_override_from_ctx() local
638 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
642 return set_security_override(new, secid); in set_security_override_from_ctx()
/linux/include/net/
H A Dscm.h49 u32 secid; /* Passed security ID */ member
62 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
H A Dnetlabel.h203 u32 secid; member
422 u32 secid,
532 u32 secid, in netlbl_cfg_unlbl_static_add() argument
/linux/security/
H A Dsecurity.c2794 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() argument
2796 *secid = 0; in security_cred_getsecid()
2797 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid()
2826 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() argument
2828 return call_int_hook(kernel_act_as, new, secid); in security_kernel_act_as()
3827 int security_secid_to_secctx(u32 secid, struct lsm_context *cp) in security_secid_to_secctx() argument
3829 return call_int_hook(secid_to_secctx, secid, cp); in security_secid_to_secctx()
3875 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument
3877 *secid = 0; in security_secctx_to_secid()
3878 return call_int_hook(secctx_to_secid, secdata, seclen, secid); in security_secctx_to_secid()
[all …]
/linux/security/apparmor/include/
H A Dnet.h81 u32 secid; member
117 u32 secid, const struct sock *sk);
/linux/net/netlabel/
H A Dnetlabel_unlabeled.h214 u32 secid,
/linux/security/smack/
H A Dsmack_access.c551 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
670 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
676 if (skp->smk_secid == secid) { in smack_from_secid()
H A Dsmack_lsm.c2169 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() argument
2175 *secid = skp->smk_secid; in smack_cred_getsecid()
2201 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() argument
2205 new_tsp->smk_task = smack_from_secid(secid); in smack_kernel_act_as()
4088 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
4385 struct sk_buff *skb, u32 *secid) in smack_socket_getpeersec_dgram() argument
4433 *secid = s; in smack_socket_getpeersec_dgram()
4901 static int smack_secid_to_secctx(u32 secid, struct lsm_context *cp) in smack_secid_to_secctx() argument
4903 return smack_to_secctx(smack_from_secid(secid), cp); in smack_secid_to_secctx()
4927 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument
[all …]
/linux/net/unix/
H A Daf_unix.h19 u32 secid; /* Security ID */ member
/linux/security/selinux/include/
H A Dxfrm.h25 struct xfrm_sec_ctx *polsec, u32 secid);
/linux/Documentation/translations/zh_CN/networking/
H A Dindex.rst128 * secid

12