/kernel/linux/linux-5.10/security/selinux/ |
H A D | xfrm.c | 219 return SECSID_NULL; in selinux_xfrm_skb_sid_egress() 222 return SECSID_NULL; in selinux_xfrm_skb_sid_egress() 230 u32 sid_session = SECSID_NULL; in selinux_xfrm_skb_sid_ingress() 241 if (sid_session == SECSID_NULL) { in selinux_xfrm_skb_sid_ingress() 246 *sid = SECSID_NULL; in selinux_xfrm_skb_sid_ingress() 265 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 276 if (rc == 0 && *sid == SECSID_NULL) in selinux_xfrm_skb_sid()
|
H A D | netlabel.c | 197 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid() 207 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
|
H A D | hooks.c | 4455 * returns zero if the value in @sid is valid (although it may be SECSID_NULL) 4502 if (skb_sid != SECSID_NULL) in selinux_conn_sid() 4516 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid() 5122 u32 peer_sid = SECSID_NULL; in selinux_socket_getpeersec_stream() 5128 if (peer_sid == SECSID_NULL) in selinux_socket_getpeersec_stream() 5153 u32 peer_secid = SECSID_NULL; in selinux_socket_getpeersec_dgram() 5174 if (peer_secid == SECSID_NULL) in selinux_socket_getpeersec_dgram() 5261 /* This will return peer_sid = SECSID_NULL if there are in selinux_sctp_assoc_request() 5269 if (peer_sid == SECSID_NULL) in selinux_sctp_assoc_request() 5816 /* At this point, if the returned skb peerlbl is SECSID_NULL in selinux_ip_postroute() [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | xfrm.c | 216 return SECSID_NULL; in selinux_xfrm_skb_sid_egress() 219 return SECSID_NULL; in selinux_xfrm_skb_sid_egress() 227 u32 sid_session = SECSID_NULL; in selinux_xfrm_skb_sid_ingress() 238 if (sid_session == SECSID_NULL) { in selinux_xfrm_skb_sid_ingress() 243 *sid = SECSID_NULL; in selinux_xfrm_skb_sid_ingress() 262 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 273 if (rc == 0 && *sid == SECSID_NULL) in selinux_xfrm_skb_sid()
|
H A D | netlabel.c | 202 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid() 212 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
|
H A D | hooks.c | 4499 * returns zero if the value in @sid is valid (although it may be SECSID_NULL) 4546 if (skb_sid != SECSID_NULL) in selinux_conn_sid() 4560 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid() 5141 u32 peer_sid = SECSID_NULL; in selinux_socket_getpeersec_stream() 5147 if (peer_sid == SECSID_NULL) in selinux_socket_getpeersec_stream() 5170 u32 peer_secid = SECSID_NULL; in selinux_socket_getpeersec_dgram() 5191 if (peer_secid == SECSID_NULL) in selinux_socket_getpeersec_dgram() 5276 asoc->peer_secid = SECSID_NULL; in selinux_sctp_process_new_assoc() 5278 /* This will return peer_sid = SECSID_NULL if there are in selinux_sctp_process_new_assoc() 5285 if (asoc->peer_secid == SECSID_NULL) in selinux_sctp_process_new_assoc() [all...] |
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | xfrm.h | 77 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 87 *sid = SECSID_NULL; in selinux_xfrm_skb_sid()
|
H A D | netlabel.h | 91 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
|
H A D | security.h | 22 #define SECSID_NULL 0x00000000 /* unspecified SID */ macro
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | xfrm.h | 79 *sid = SECSID_NULL; in selinux_xfrm_decode_session() 89 *sid = SECSID_NULL; in selinux_xfrm_skb_sid()
|
H A D | netlabel.h | 91 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
|
H A D | security.h | 24 #define SECSID_NULL 0x00000000 /* unspecified SID */ macro
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | mls.c | 252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid() 264 if (def_sid == SECSID_NULL) in mls_context_to_sid() 375 NULL, SECSID_NULL); in mls_from_string()
|
H A D | services.c | 1547 *sid = SECSID_NULL; in security_context_to_sid_core() 1605 sid, SECSID_NULL, gfp, 0); in security_context_to_sid() 1646 sid, SECSID_NULL, GFP_KERNEL, 1); in security_context_to_sid_force() 2034 newc, SECSID_NULL); in convert_context() 3288 * returns zero. Otherwise @peer_sid is set to SECSID_NULL and the function 3293 * no peer labels | 0 | SECSID_NULL 3296 * multiple, inconsistent labels | -<errno> | SECSID_NULL 3311 *peer_sid = SECSID_NULL; in security_net_peersid_resolve() 3316 if (xfrm_sid == SECSID_NULL) { in security_net_peersid_resolve() 3321 * and is treated as if nlbl_sid == SECSID_NULL whe in security_net_peersid_resolve() [all...] |
H A D | policydb.c | 885 if (sid == SECSID_NULL) { in policydb_load_isids()
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | mls.c | 252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid() 264 if (def_sid == SECSID_NULL) in mls_context_to_sid() 375 NULL, SECSID_NULL); in mls_from_string()
|
H A D | services.c | 1527 *sid = SECSID_NULL; in security_context_to_sid_core() 1584 sid, SECSID_NULL, gfp, 0); in security_context_to_sid() 1623 sid, SECSID_NULL, GFP_KERNEL, 1); in security_context_to_sid_force() 2006 rc = string_to_context_struct(args->newp, NULL, s, newc, SECSID_NULL); in services_convert_context() 3243 * returns zero. Otherwise @peer_sid is set to SECSID_NULL and the function 3248 * no peer labels | 0 | SECSID_NULL 3251 * multiple, inconsistent labels | -<errno> | SECSID_NULL 3265 *peer_sid = SECSID_NULL; in security_net_peersid_resolve() 3270 if (xfrm_sid == SECSID_NULL) { in security_net_peersid_resolve() 3275 * and is treated as if nlbl_sid == SECSID_NULL whe in security_net_peersid_resolve() [all...] |
H A D | policydb.c | 880 if (sid == SECSID_NULL) { in policydb_load_isids()
|