Lines Matching refs:sid
1318 const char *security_get_initial_sid_context(u32 sid)
1320 if (unlikely(sid > SECINITSID_NUM))
1322 return initial_sid_to_string[sid];
1326 u32 sid, char **scontext,
1341 if (sid <= SECINITSID_NUM) {
1343 const char *s = initial_sid_to_string[sid];
1357 "load_policy on unknown SID %d\n", __func__, sid);
1366 entry = sidtab_search_entry_force(sidtab, sid);
1368 entry = sidtab_search_entry(sidtab, sid);
1371 __func__, sid);
1389 * @sid: security identifier, SID
1393 * Write the string representation of the context associated with @sid
1398 u32 sid, char **scontext, u32 *scontext_len)
1400 return security_sid_to_context_core(state, sid, scontext,
1404 int security_sid_to_context_force(struct selinux_state *state, u32 sid,
1407 return security_sid_to_context_core(state, sid, scontext,
1414 * @sid: security identifier, SID
1418 * Write the string representation of the context associated with @sid
1424 int security_sid_to_context_inval(struct selinux_state *state, u32 sid,
1427 return security_sid_to_context_core(state, sid, scontext,
1514 u32 *sid, u32 def_sid, gfp_t gfp_flags,
1540 *sid = i;
1544 *sid = SECINITSID_KERNEL;
1547 *sid = SECSID_NULL;
1569 rc = sidtab_context_to_sid(sidtab, &context, sid);
1592 * @sid: security identifier, SID
1601 const char *scontext, u32 scontext_len, u32 *sid,
1605 sid, SECSID_NULL, gfp, 0);
1609 const char *scontext, u32 *sid, gfp_t gfp)
1612 sid, gfp);
1621 * @sid: security identifier, SID
1635 u32 *sid, u32 def_sid, gfp_t gfp_flags)
1638 sid, def_sid, gfp_flags, 1);
1643 u32 *sid)
1646 sid, SECSID_NULL, GFP_KERNEL, 1);
1894 /* Obtain the sid for the context. */
2103 while (oc && oc->sid[0] != SECINITSID_UNLABELED)
2373 * ocontext_to_sid - Helper to safely get sid for an ocontext
2390 u32 sid;
2393 sid = smp_load_acquire(&c->sid[index]);
2394 if (!sid) {
2395 rc = sidtab_context_to_sid(sidtab, &c->context[index], &sid);
2403 smp_store_release(&c->sid[index], sid);
2405 *out_sid = sid;
2743 u32 *mysids = NULL, *mysids2, sid;
2791 rc = sidtab_context_to_sid(sidtab, &usercon, &sid);
2799 mysids[mynel++] = sid;
2809 mysids[mynel++] = sid;
2849 * @sid: SID for path
2862 u32 *sid)
2876 *sid = SECINITSID_UNLABELED;
2897 return ocontext_to_sid(sidtab, c, 0, sid);
2905 * @sid: SID for path
2914 u32 *sid)
2920 *sid = SECINITSID_UNLABELED;
2928 orig_sclass, sid);
2938 u32 *sid)
2941 return __security_genfs_sid(policy, fstype, path, orig_sclass, sid);
2960 sbsec->sid = SECINITSID_UNLABELED;
2980 rc = ocontext_to_sid(sidtab, c, 0, &sbsec->sid);
2989 SECCLASS_DIR, &sbsec->sid);
3187 * security_sid_mls_copy() - computes a new sid based on the given
3188 * sid and the mls portion of mls_sid.
3191 u32 sid, u32 mls_sid, u32 *new_sid)
3204 *new_sid = sid;
3218 *new_sid = sid;
3223 context1 = sidtab_search(sidtab, sid);
3226 __func__, sid);
3291 * | function return | @sid
3672 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule)
3698 ctxt = sidtab_search(policy->sidtab, sid);
3701 sid);
3813 * @sid: the SELinux SID
3822 u32 sid)
3835 *sid_cache = sid;
3844 * @sid: the SELinux SID
3858 u32 *sid)
3868 *sid = SECSID_NULL;
3880 *sid = *(u32 *)secattr->cache->data;
3882 *sid = secattr->attr.secid;
3905 rc = sidtab_context_to_sid(sidtab, &ctx_new, sid);
3914 security_netlbl_cache_add(secattr, *sid);
3916 *sid = SECSID_NULL;
3925 * @sid: the SELinux SID
3929 * Convert the given SELinux SID in @sid into a NetLabel security attribute.
3934 u32 sid, struct netlbl_lsm_secattr *secattr)
3949 ctx = sidtab_search(policy->sidtab, sid);
3959 secattr->attr.secid = sid;