Lines Matching refs:secid

2483  * security_inode_getsecid() - Get an inode's secid
2485 * @secid: secid to return
2487 * Get the secid associated with the node. In case of failure, @secid will be
2490 void security_inode_getsecid(struct inode *inode, u32 *secid)
2492 call_void_hook(inode_getsecid, inode, secid);
2992 * security_cred_getsecid() - Get the secid from a set of credentials
2994 * @secid: secid value
2997 * failure, @secid will be set to zero.
2999 void security_cred_getsecid(const struct cred *c, u32 *secid)
3001 *secid = 0;
3002 call_void_hook(cred_getsecid, c, secid);
3007 * security_kernel_act_as() - Set the kernel credentials to act as secid
3009 * @secid: secid
3012 * The current task must be the one that nominated @secid.
3016 int security_kernel_act_as(struct cred *new, u32 secid)
3018 return call_int_hook(kernel_act_as, 0, new, secid);
3251 * security_current_getsecid_subj() - Get the current task's subjective secid
3252 * @secid: secid value
3255 * it in @secid. In case of failure, @secid will be set to zero.
3257 void security_current_getsecid_subj(u32 *secid)
3259 *secid = 0;
3260 call_void_hook(current_getsecid_subj, secid);
3265 * security_task_getsecid_obj() - Get a task's objective secid
3267 * @secid: secid value
3270 * return it in @secid. In case of failure, @secid will be set to zero.
3272 void security_task_getsecid_obj(struct task_struct *p, u32 *secid)
3274 *secid = 0;
3275 call_void_hook(task_getsecid_obj, p, secid);
3489 * security_ipc_getsecid() - Get the sysv ipc object's secid
3491 * @secid: secid pointer
3493 * Get the secid associated with the ipc object. In case of failure, @secid
3496 void security_ipc_getsecid(struct kern_ipc_perm *ipcp, u32 *secid)
3498 *secid = 0;
3499 call_void_hook(ipc_getsecid, ipcp, secid);
3903 * security_secid_to_secctx() - Convert a secid to a secctx
3904 * @secid: secid
3908 * Convert secid to security context. If @secdata is NULL the length of the
3915 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
3925 rc = hp->hook.secid_to_secctx(secid, secdata, seclen);
3935 * security_secctx_to_secid() - Convert a secctx to a secid
3938 * @secid: secid
3940 * Convert security context to secid.
3944 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
3946 *secid = 0;
3947 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid);
4422 * @secid: remote peer label secid
4433 struct sk_buff *skb, u32 *secid)
4443 rc = hp->hook.socket_getpeersec_dgram(sock, skb, secid);
4492 * security_sk_classify_flow() - Set a flow's secid based on socket
4496 * Set the target flow's secid to socket's secid.
4505 * security_req_classify_flow() - Set a flow's secid based on request_sock
4509 * Sets @flic's secid to @req's secid.
4523 * Sets @parent's inode secid to @sk's secid and update @sk with any necessary
4578 * @secid: new secmark value
4580 * Check if the process should be allowed to relabel packets to @secid.
4584 int security_secmark_relabel_packet(u32 secid)
4586 return call_int_hook(secmark_relabel_packet, 0, secid);
4933 * @secid: secid from the flow
4937 * correspond to secid.
4942 struct xfrm_sec_ctx *polsec, u32 secid)
4944 return call_int_hook(xfrm_state_alloc_acquire, 0, x, polsec, secid);
4975 * @fl_secid: flow secid used to authorize access
5024 * security_xfrm_decode_session() - Determine the xfrm secid for a packet
5026 * @secid: secid
5028 * Decode the packet in @skb and return the security label in @secid.
5030 * Return: Return 0 if all xfrms used have the same secid.
5032 int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
5034 return call_int_hook(xfrm_decode_session, 0, skb, secid, 1);
5158 * @secid: security label
5163 * Determine if given @secid matches a rule previously approved by
5166 * Return: Returns 1 if secid matches the rule, 0 if it does not, -ERRNO on
5169 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule)
5171 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule);