/openbmc/linux/security/apparmor/ |
H A D | secid.c | 47 void aa_secid_update(u32 secid, struct aa_label *label) in aa_secid_update() 59 struct aa_label *aa_secid_to_label(u32 secid) in aa_secid_to_label() 64 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() 93 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() 141 void aa_free_secid(u32 secid) in aa_free_secid()
|
H A D | net.c | 221 static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, in aa_secmark_perm() 257 u32 secid, const struct sock *sk) in apparmor_secmark_check()
|
H A D | lsm.c | 798 static void apparmor_current_getsecid_subj(u32 *secid) in apparmor_current_getsecid_subj() 805 static void apparmor_task_getsecid_obj(struct task_struct *p, u32 *secid) in apparmor_task_getsecid_obj() 1209 struct sk_buff *skb, u32 *secid) in apparmor_socket_getpeersec_dgram()
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_main.c | 208 u32 secid, char *buf, loff_t size, int mask, in process_measurement() 433 u32 secid; in ima_file_mmap() local 478 u32 secid; in ima_file_mprotect() local 529 u32 secid; in ima_bprm_check() local 554 u32 secid; in ima_file_check() local 758 u32 secid; in ima_read_file() local 808 u32 secid; in ima_post_read_file() local 948 u32 secid; in process_buffer_measurement() local
|
H A D | ima_api.c | 190 const struct cred *cred, u32 secid, int mask, in ima_get_action()
|
H A D | ima_appraise.c | 76 u32 secid; in ima_must_appraise() local
|
H A D | ima_policy.c | 570 u32 secid, enum ima_hooks func, int mask, in ima_match_rules() 740 const struct cred *cred, u32 secid, enum ima_hooks func, in ima_match_policy()
|
H A D | ima.h | 442 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match()
|
/openbmc/linux/include/uapi/linux/netfilter/ |
H A D | xt_SECMARK.h | 19 __u32 secid; member 26 __u32 secid; member
|
/openbmc/linux/net/netlabel/ |
H A D | netlabel_unlabeled.c | 69 u32 secid; member 77 u32 secid; member 234 u32 secid) in netlbl_unlhsh_add_addr4() 274 u32 secid) in netlbl_unlhsh_add_addr6() 369 u32 secid, in netlbl_unlhsh_add() 883 u32 secid; in netlbl_unlabel_staticadd() local 934 u32 secid; in netlbl_unlabel_staticadddef() local 1073 u32 secid; in netlbl_unlabel_staticlist_gen() local
|
/openbmc/linux/drivers/dio/ |
H A D | dio.c | 124 u_char prid, secid, i; in dio_find() local 199 u_char prid, secid = 0; /* primary, secondary ID bytes */ in dio_init() local
|
/openbmc/linux/kernel/ |
H A D | cred.c | 685 int set_security_override(struct cred *new, u32 secid) in set_security_override() 703 u32 secid; in set_security_override_from_ctx() local
|
/openbmc/linux/include/linux/ |
H A D | security.h | 952 static inline void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() 1084 static inline void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() 1089 static inline int security_kernel_act_as(struct cred *cred, u32 secid) in security_kernel_act_as() 1166 static inline void security_current_getsecid_subj(u32 *secid) in security_current_getsecid_subj() 1171 static inline void security_task_getsecid_obj(struct task_struct *p, u32 *secid) in security_task_getsecid_obj() 1249 static inline void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() 1371 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() 1378 u32 *secid) in security_secctx_to_secid() 1599 …c inline int security_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) in security_socket_getpeersec_dgram() 1647 static inline int security_secmark_relabel_packet(u32 secid) in security_secmark_relabel_packet() [all …]
|
/openbmc/linux/security/ |
H A D | security.c | 2490 void security_inode_getsecid(struct inode *inode, u32 *secid) in security_inode_getsecid() 2999 void security_cred_getsecid(const struct cred *c, u32 *secid) in security_cred_getsecid() 3016 int security_kernel_act_as(struct cred *new, u32 secid) in security_kernel_act_as() 3257 void security_current_getsecid_subj(u32 *secid) in security_current_getsecid_subj() 3272 void security_task_getsecid_obj(struct task_struct *p, u32 *secid) in security_task_getsecid_obj() 3496 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in security_ipc_getsecid() 3915 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() 3944 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() 4433 struct sk_buff *skb, u32 *secid) in security_socket_getpeersec_dgram() 4584 int security_secmark_relabel_packet(u32 secid) in security_secmark_relabel_packet() [all …]
|
/openbmc/linux/include/net/ |
H A D | netlabel.h | 100 u32 secid; member 204 u32 secid; member 526 u32 secid, in netlbl_cfg_unlbl_static_add()
|
H A D | scm.h | 37 u32 secid; /* Passed security ID */ member
|
H A D | af_unix.h | 38 u32 secid; /* Security ID */ member
|
H A D | request_sock.h | 71 u32 secid; member
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 1622 static void smack_inode_getsecid(struct inode *inode, u32 *secid) in smack_inode_getsecid() 2112 static void smack_cred_getsecid(const struct cred *cred, u32 *secid) in smack_cred_getsecid() 2129 static int smack_kernel_act_as(struct cred *new, u32 secid) in smack_kernel_act_as() 2218 static void smack_current_getsecid_subj(u32 *secid) in smack_current_getsecid_subj() 2232 static void smack_task_getsecid_obj(struct task_struct *p, u32 *secid) in smack_task_getsecid_obj() 3419 static void smack_ipc_getsecid(struct kern_ipc_perm *ipp, u32 *secid) in smack_ipc_getsecid() 4203 struct sk_buff *skb, u32 *secid) in smack_socket_getpeersec_dgram() 4685 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() 4738 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() 4756 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid()
|
H A D | smack_access.c | 610 struct smack_known *smack_from_secid(const u32 secid) in smack_from_secid()
|
/openbmc/linux/security/apparmor/include/ |
H A D | net.h | 86 u32 secid; member
|
/openbmc/linux/security/selinux/ |
H A D | xfrm.c | 342 struct xfrm_sec_ctx *polsec, u32 secid) in selinux_xfrm_state_alloc_acquire()
|
H A D | hooks.c | 3492 static void selinux_inode_getsecid(struct inode *inode, u32 *secid) in selinux_inode_getsecid() 4017 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() 4026 static int selinux_kernel_act_as(struct cred *new, u32 secid) in selinux_kernel_act_as() 4157 static void selinux_current_getsecid_subj(u32 *secid) in selinux_current_getsecid_subj() 4162 static void selinux_task_getsecid_obj(struct task_struct *p, u32 *secid) in selinux_task_getsecid_obj() 4237 u32 secid; in selinux_task_kill() local 5177 static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *skb, u32 *secid) in selinux_socket_getpeersec_dgram() 5243 static void selinux_sk_getsecid(const struct sock *sk, u32 *secid) in selinux_sk_getsecid() 6313 static void selinux_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid) in selinux_ipc_getsecid() 6514 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() [all …]
|
/openbmc/linux/net/netfilter/ |
H A D | nft_meta.c | 910 u32 secid; member
|
/openbmc/linux/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.h | 103 u8 secid; /* 0x20 for ECC priv key section marker */ member
|