Home
last modified time | relevance | path

Searched refs:secid (Results 1 – 25 of 50) sorted by relevance

12

/openbmc/linux/security/apparmor/
H A Dsecid.c47 void aa_secid_update(u32 secid, struct aa_label *label) in aa_secid_update() argument
52 __xa_store(&aa_secids, secid, label, 0); in aa_secid_update()
59 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() argument
61 return xa_load(&aa_secids, secid); in aa_secid_to_label()
64 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument
67 struct aa_label *label = aa_secid_to_label(secid); in apparmor_secid_to_secctx()
101 *secid = label->secid; in apparmor_secctx_to_secid()
125 ret = __xa_alloc(&aa_secids, &label->secid, label, in aa_alloc_secid()
130 label->secid = AA_SECID_INVALID; in aa_alloc_secid()
141 void aa_free_secid(u32 secid) in aa_free_secid() argument
[all …]
H A Dnet.c205 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
216 secmark->secid = label->secid; in apparmor_secmark_init()
221 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() argument
233 if (!rules->secmark[i].secid) { in aa_secmark_perm()
239 if (rules->secmark[i].secid == secid || in aa_secmark_perm()
240 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
257 u32 secid, const struct sock *sk) in apparmor_secmark_check() argument
263 aa_secmark_perm(profile, request, secid, in apparmor_secmark_check()
/openbmc/linux/net/netfilter/
H A Dxt_SECMARK.c33 secmark = info->secid; in secmark_tg()
48 info->secid = 0; in checkentry_lsm()
51 &info->secid); in checkentry_lsm()
59 if (!info->secid) { in checkentry_lsm()
65 err = security_secmark_relabel_packet(info->secid); in checkentry_lsm()
129 info->secid = newinfo.secid; in secmark_tg_check_v0()
139 .secid = info->secid, in secmark_tg_v0()
175 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
/openbmc/linux/security/apparmor/include/
H A Dsecid.h27 struct aa_label *aa_secid_to_label(u32 secid);
28 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
29 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
34 void aa_free_secid(u32 secid);
35 void aa_secid_update(u32 secid, struct aa_label *label);
H A Dnet.h86 u32 secid; member
114 u32 secid, const struct sock *sk);
/openbmc/linux/security/integrity/ima/
H A Dima_main.c433 u32 secid; in ima_file_mmap() local
439 security_current_getsecid_subj(&secid); in ima_file_mmap()
478 u32 secid; in ima_file_mprotect() local
486 security_current_getsecid_subj(&secid); in ima_file_mprotect()
492 current_cred(), secid, MAY_EXEC, in ima_file_mprotect()
529 u32 secid; in ima_bprm_check() local
554 u32 secid; in ima_file_check() local
758 u32 secid; in ima_read_file() local
808 u32 secid; in ima_post_read_file() local
948 u32 secid; in process_buffer_measurement() local
[all …]
H A Dima.h259 const struct cred *cred, u32 secid, int mask,
290 const struct cred *cred, u32 secid, enum ima_hooks func,
442 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
/openbmc/linux/net/netlabel/
H A Dnetlabel_unlabeled.c69 u32 secid; member
77 u32 secid; member
246 entry->secid = secid; in netlbl_unlhsh_add_addr4()
290 entry->secid = secid; in netlbl_unlhsh_add_addr6()
883 u32 secid; in netlbl_unlabel_staticadd() local
907 &secid); in netlbl_unlabel_staticadd()
934 u32 secid; in netlbl_unlabel_staticadddef() local
956 &secid); in netlbl_unlabel_staticadddef()
1073 u32 secid; in netlbl_unlabel_staticlist_gen() local
1113 secid = addr4->secid; in netlbl_unlabel_staticlist_gen()
[all …]
H A Dnetlabel_user.c101 if (audit_info->secid != 0 && in netlbl_audit_start_common()
102 security_secid_to_secctx(audit_info->secid, in netlbl_audit_start_common()
H A Dnetlabel_user.h35 security_current_getsecid_subj(&audit_info->secid); in netlbl_netlink_auditinfo()
H A Dnetlabel_unlabeled.h214 u32 secid,
/openbmc/linux/drivers/dio/
H A Ddio.c124 u_char prid, secid, i; in dio_find() local
153 secid = DIO_SECID(va); in dio_find()
154 id = DIO_ENCODE_ID(prid, secid); in dio_find()
199 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
244 secid = DIO_SECID(va); in dio_init()
245 dev->id = DIO_ENCODE_ID(prid, secid); in dio_init()
253 printk(":%02X", secid); in dio_init()
/openbmc/linux/include/linux/
H A Dsecurity.h414 int security_kernel_act_as(struct cred *new, u32 secid);
433 void security_current_getsecid_subj(u32 *secid);
954 *secid = 0; in security_inode_getsecid()
1086 *secid = 0; in security_cred_getsecid()
1168 *secid = 0; in security_current_getsecid_subj()
1173 *secid = 0; in security_task_getsecid_obj()
1251 *secid = 0; in security_ipc_getsecid()
1378 u32 *secid) in security_secctx_to_secid() argument
1469 int security_secmark_relabel_packet(u32 secid);
1755 struct xfrm_sec_ctx *polsec, u32 secid);
[all …]
H A Dlsm_hook_defs.h164 LSM_HOOK(void, LSM_RET_VOID, inode_getsecid, struct inode *inode, u32 *secid)
199 LSM_HOOK(void, LSM_RET_VOID, cred_getsecid, const struct cred *c, u32 *secid)
200 LSM_HOOK(int, 0, kernel_act_as, struct cred *new, u32 secid)
218 LSM_HOOK(void, LSM_RET_VOID, current_getsecid_subj, u32 *secid)
220 struct task_struct *p, u32 *secid)
240 u32 *secid)
271 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata,
317 struct sk_buff *skb, u32 *secid)
330 LSM_HOOK(int, 0, secmark_relabel_packet, u32 secid)
371 struct xfrm_sec_ctx *polsec, u32 secid)
[all …]
/openbmc/linux/include/uapi/linux/netfilter/
H A Dxt_SECMARK.h19 __u32 secid; member
26 __u32 secid; member
/openbmc/linux/security/
H A Dsecurity.c2492 call_void_hook(inode_getsecid, inode, secid); in security_inode_getsecid()
3001 *secid = 0; in security_cred_getsecid()
3002 call_void_hook(cred_getsecid, c, secid); in security_cred_getsecid()
3259 *secid = 0; in security_current_getsecid_subj()
3260 call_void_hook(current_getsecid_subj, secid); in security_current_getsecid_subj()
3274 *secid = 0; in security_task_getsecid_obj()
3275 call_void_hook(task_getsecid_obj, p, secid); in security_task_getsecid_obj()
3498 *secid = 0; in security_ipc_getsecid()
3499 call_void_hook(ipc_getsecid, ipcp, secid); in security_ipc_getsecid()
3946 *secid = 0; in security_secctx_to_secid()
[all …]
/openbmc/linux/Documentation/networking/
H A Dsecid.rst4 LSM/SeLinux secid
9 The secid member in the flow structure is used in LSMs (e.g. SELinux) to indicate
/openbmc/linux/security/selinux/
H A Dxfrm.c342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire() argument
352 if (secid == 0) in selinux_xfrm_state_alloc_acquire()
355 rc = security_sid_to_context(secid, &ctx_str, in selinux_xfrm_state_alloc_acquire()
368 ctx->ctx_sid = secid; in selinux_xfrm_state_alloc_acquire()
H A Dnetlabel.c110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
289 rc = security_netlbl_sid_to_secattr(asoc->secid, &secattr); in selinux_netlbl_sctp_assoc_request()
337 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
/openbmc/linux/include/net/
H A Dscm.h37 u32 secid; /* Passed security ID */ member
50 security_socket_getpeersec_dgram(sock, NULL, &scm->secid); in unix_get_peersec_dgram()
101 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
H A Dnetlabel.h100 u32 secid; member
204 u32 secid; member
418 u32 secid,
526 u32 secid, in netlbl_cfg_unlbl_static_add() argument
/openbmc/linux/kernel/
H A Dcred.c685 int set_security_override(struct cred *new, u32 secid) in set_security_override() argument
687 return security_kernel_act_as(new, secid); in set_security_override()
703 u32 secid; in set_security_override_from_ctx() local
706 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); in set_security_override_from_ctx()
710 return set_security_override(new, secid); in set_security_override_from_ctx()
/openbmc/linux/security/smack/
H A Dsmack_access.c524 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
610 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid() argument
616 if (skp->smk_secid == secid) { in smack_from_secid()
H A Dsmack_lsm.c1626 *secid = skp->smk_secid; in smack_inode_getsecid()
2118 *secid = skp->smk_secid; in smack_cred_getsecid()
2222 *secid = skp->smk_secid; in smack_current_getsecid_subj()
2236 *secid = skp->smk_secid; in smack_task_getsecid_obj()
3424 *secid = iskp->smk_secid; in smack_ipc_getsecid()
3894 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
4197 struct sk_buff *skb, u32 *secid) in smack_socket_getpeersec_dgram() argument
4245 *secid = s; in smack_socket_getpeersec_dgram()
4690 skp = smack_from_secid(secid); in smack_audit_rule_match()
4753 *secid = skp->smk_secid; in smack_secctx_to_secid()
[all …]
/openbmc/linux/security/selinux/include/
H A Dxfrm.h25 struct xfrm_sec_ctx *polsec, u32 secid);

12