Lines Matching defs:security
3 * Security-Enhanced Linux (SELinux) security module
209 * initialise the security for the init task
220 * get the security ID of a set of credentials
256 * get the objective security ID of a task
271 * Try reloading inode security labels that have been marked as invalid. The
290 * Try reloading the inode security label. This will fail if
315 * Get the security label of an inode.
331 * Get the security label of a dentry's backing inode.
350 * As not all inode security structures are in a list, we check for
521 pr_warn("SELinux: (dev %s, type %s) has no security xattr handler\n",
648 after the initial policy is loaded and the security
658 "before the security server is initialized\n");
665 * Since the generic VFS calls will not contain any security mount data
670 * this sb does not set any security options. (The first options
682 * than once with different security options.
755 * line and security labels must be ignored.
865 "security settings for (dev %s, type %s)\n", sb->s_id,
895 "different security settings for (dev %s, "
1004 pr_warn("SELinux: Unable to set superblock options before the security server is initialized\n");
1407 /* The inode's security attributes must be initialized before first use. */
1430 after the initial policy is loaded and the security
2223 /* binprm security operations */
2544 /* superblock security operations */
2717 pr_warn("SELinux: unable to change security options "
2781 * Ensure that fc->security remains NULL when no options are set
2797 fc->security = opts;
2804 const struct selinux_mnt_opts *src = src_fc->security;
2809 fc->security = kmemdup(src, sizeof(*src), GFP_KERNEL);
2810 return fc->security ? 0 : -ENOMEM;
2832 return selinux_add_opt(opt, param->string, &fc->security);
2835 /* inode security operations */
2988 * Now that we've initialized security, check whether we're
3351 /* No one is allowed to remove a SELinux security label.
3401 * Copy the inode security context value to the user.
3595 /* file security operations */
3958 * Task label is already saved in the file security
3974 /* task security operations */
4014 * set the security data for a kernel service
4037 * set the file creation context in a security record to the same as the
4498 * the security server function security_net_peersid_cmp(). The function
4555 /* socket security operations */
4790 * and sctp_sendmsg(3) as described in Documentation/security/SCTP.rst
5561 static int selinux_tun_dev_alloc_security(void **security)
5570 *security = tunsec;
5574 static void selinux_tun_dev_free_security(void *security)
5576 kfree(security);
5594 static int selinux_tun_dev_attach_queue(void *security)
5596 struct tun_security_struct *tunsec = security;
5602 static int selinux_tun_dev_attach(struct sock *sk, void *security)
5604 struct tun_security_struct *tunsec = security;
5620 static int selinux_tun_dev_open(void *security)
5622 struct tun_security_struct *tunsec = security;
5723 * security label in the packet itself this is the
5818 * query the packet directly to determine the security label. */
5830 * this particular case the correct security label is assigned
5867 /* Locally generated packet, fetch the security label from the
5994 /* message queue security operations */
6121 /* Shared Memory security operations */
6199 /* Semaphore security operations */
6580 k->security = ksec;
6586 struct key_security_struct *ksec = k->security;
6588 k->security = NULL;
6632 ksec = key->security;
6639 struct key_security_struct *ksec = key->security;
6655 struct key_security_struct *ksec = key->security;
6780 bpfsec = map->security;
6787 bpfsec = prog->aux->security;
6801 bpfsec = map->security;
6811 bpfsec = prog->aux->security;
6825 map->security = bpfsec;
6832 struct bpf_security_struct *bpfsec = map->security;
6834 map->security = NULL;
6847 aux->security = bpfsec;
6854 struct bpf_security_struct *bpfsec = aux->security;
6856 aux->security = NULL;
6900 event->security = perfsec;
6907 struct perf_event_security_struct *perfsec = event->security;
6909 event->security = NULL;
6915 struct perf_event_security_struct *perfsec = event->security;
6924 struct perf_event_security_struct *perfsec = event->security;
7289 /* Set the security state for the initial task. */