Lines Matching refs:sid

1301 const char *security_get_initial_sid_context(u32 sid)
1303 if (unlikely(sid > SECINITSID_NUM))
1305 return initial_sid_to_string[sid];
1308 static int security_sid_to_context_core(u32 sid, char **scontext,
1323 if (sid <= SECINITSID_NUM) {
1325 const char *s = initial_sid_to_string[sid];
1339 "load_policy on unknown SID %d\n", __func__, sid);
1348 entry = sidtab_search_entry_force(sidtab, sid);
1350 entry = sidtab_search_entry(sidtab, sid);
1353 __func__, sid);
1371 * @sid: security identifier, SID
1375 * Write the string representation of the context associated with @sid
1379 int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len)
1381 return security_sid_to_context_core(sid, scontext,
1385 int security_sid_to_context_force(u32 sid,
1388 return security_sid_to_context_core(sid, scontext,
1395 * @sid: security identifier, SID
1399 * Write the string representation of the context associated with @sid
1405 int security_sid_to_context_inval(u32 sid,
1408 return security_sid_to_context_core(sid, scontext,
1494 u32 *sid, u32 def_sid, gfp_t gfp_flags,
1520 *sid = i;
1524 *sid = SECINITSID_KERNEL;
1527 *sid = SECSID_NULL;
1549 rc = sidtab_context_to_sid(sidtab, &context, sid);
1572 * @sid: security identifier, SID
1580 int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid,
1584 sid, SECSID_NULL, gfp, 0);
1587 int security_context_str_to_sid(const char *scontext, u32 *sid, gfp_t gfp)
1590 sid, gfp);
1599 * @sid: security identifier, SID
1613 u32 *sid, u32 def_sid, gfp_t gfp_flags)
1616 sid, def_sid, gfp_flags, 1);
1620 u32 *sid)
1623 sid, SECSID_NULL, GFP_KERNEL, 1);
1870 /* Obtain the sid for the context. */
2070 while (oc && oc->sid[0] != SECINITSID_UNLABELED)
2337 * ocontext_to_sid - Helper to safely get sid for an ocontext
2354 u32 sid;
2357 sid = smp_load_acquire(&c->sid[index]);
2358 if (!sid) {
2359 rc = sidtab_context_to_sid(sidtab, &c->context[index], &sid);
2367 smp_store_release(&c->sid[index], sid);
2369 *out_sid = sid;
2701 u32 *mysids = NULL, *mysids2, sid;
2749 rc = sidtab_context_to_sid(sidtab, &usercon, &sid);
2757 mysids[mynel++] = sid;
2767 mysids[mynel++] = sid;
2807 * @sid: SID for path
2820 u32 *sid)
2833 *sid = SECINITSID_UNLABELED;
2854 return ocontext_to_sid(sidtab, c, 0, sid);
2862 * @sid: SID for path
2870 u32 *sid)
2876 *sid = SECINITSID_UNLABELED;
2884 orig_sclass, sid);
2894 u32 *sid)
2897 return __security_genfs_sid(policy, fstype, path, orig_sclass, sid);
2916 sbsec->sid = SECINITSID_UNLABELED;
2935 rc = ocontext_to_sid(sidtab, c, 0, &sbsec->sid);
2944 SECCLASS_DIR, &sbsec->sid);
3142 * security_sid_mls_copy() - computes a new sid based on the given
3143 * sid and the mls portion of mls_sid.
3145 int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid)
3158 *new_sid = sid;
3172 *new_sid = sid;
3177 context1 = sidtab_search(sidtab, sid);
3180 __func__, sid);
3238 * @peer_sid: network peer sid
3246 * | function return | @sid
3625 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule)
3651 ctxt = sidtab_search(policy->sidtab, sid);
3654 sid);
3762 * @sid: the SELinux SID
3771 u32 sid)
3784 *sid_cache = sid;
3793 * @sid: the SELinux SID
3806 u32 *sid)
3816 *sid = SECSID_NULL;
3828 *sid = *(u32 *)secattr->cache->data;
3830 *sid = secattr->attr.secid;
3853 rc = sidtab_context_to_sid(sidtab, &ctx_new, sid);
3862 security_netlbl_cache_add(secattr, *sid);
3864 *sid = SECSID_NULL;
3873 * @sid: the SELinux SID
3877 * Convert the given SELinux SID in @sid into a NetLabel security attribute.
3881 int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr)
3896 ctx = sidtab_search(policy->sidtab, sid);
3906 secattr->attr.secid = sid;