Lines Matching defs:security

3  *  NSA Security-Enhanced Linux (SELinux) security module
212 * initialise the security for the init task
224 * get the security ID of a set of credentials
235 * get the objective security ID of a task
250 * Try reloading inode security labels that have been marked as invalid. The
269 * Try reloading the inode security label. This will fail if
294 * Get the security label of an inode.
310 * Get the security label of a dentry's backing inode.
329 * As not all inode security structures are in a list, we check for
513 "%s) has no security xattr handler\n",
617 after the initial policy is loaded and the security
623 "before the security server is initialized\n");
636 * Since the generic VFS calls will not contain any security mount data
641 * this sb does not set any security options. (The first options
653 * than once with different security options.
733 * line and security labels must be ignored.
833 "security settings for (dev %s, type %s)\n", sb->s_id,
863 "different security settings for (dev %s, "
1392 /* The inode's security attributes must be initialized before first use. */
1415 after the initial policy is loaded and the security
2232 /* binprm security operations */
2562 /* superblock security operations */
2710 pr_warn("SELinux: unable to change security options "
2770 const struct selinux_mnt_opts *src = src_fc->security;
2776 fc->security = kzalloc(sizeof(struct selinux_mnt_opts), GFP_KERNEL);
2777 if (!fc->security)
2780 opts = fc->security;
2824 rc = selinux_add_opt(opt, param->string, &fc->security);
2831 /* inode security operations */
3289 /* No one is allowed to remove a SELinux security label.
3339 * Copy the inode security context value to the user.
3531 /* file security operations */
3909 * Task label is already saved in the file security
3925 /* task security operations */
3966 * set the security data for a kernel service
3990 * set the file creation context in a security record to the same as the
4454 * the security server function security_net_peersid_cmp(). The function
4511 /* socket security operations */
4752 * and sctp_sendmsg(3) as described in Documentation/security/SCTP.rst
5492 static int selinux_tun_dev_alloc_security(void **security)
5501 *security = tunsec;
5505 static void selinux_tun_dev_free_security(void *security)
5507 kfree(security);
5526 static int selinux_tun_dev_attach_queue(void *security)
5528 struct tun_security_struct *tunsec = security;
5535 static int selinux_tun_dev_attach(struct sock *sk, void *security)
5537 struct tun_security_struct *tunsec = security;
5553 static int selinux_tun_dev_open(void *security)
5555 struct tun_security_struct *tunsec = security;
5677 * security label in the packet itself this is the
5791 * query the packet directly to determine the security label. */
5803 * this particular case the correct security label is assigned
5840 /* Locally generated packet, fetch the security label from the
5990 /* message queue security operations */
6129 /* Shared Memory security operations */
6214 /* Semaphore security operations */
6608 k->security = ksec;
6614 struct key_security_struct *ksec = k->security;
6616 k->security = NULL;
6660 ksec = key->security;
6668 struct key_security_struct *ksec = key->security;
6684 struct key_security_struct *ksec = key->security;
6814 bpfsec = map->security;
6822 bpfsec = prog->aux->security;
6837 bpfsec = map->security;
6848 bpfsec = prog->aux->security;
6863 map->security = bpfsec;
6870 struct bpf_security_struct *bpfsec = map->security;
6872 map->security = NULL;
6885 aux->security = bpfsec;
6892 struct bpf_security_struct *bpfsec = aux->security;
6894 aux->security = NULL;
6964 event->security = perfsec;
6971 struct perf_event_security_struct *perfsec = event->security;
6973 event->security = NULL;
6979 struct perf_event_security_struct *perfsec = event->security;
6988 struct perf_event_security_struct *perfsec = event->security;
7295 /* Set the security state for the initial task. */