Searched refs:_setid_policy_lookup (Results 1 - 6 of 6) sorted by relevance
/kernel/linux/linux-5.10/security/safesetid/ |
H A D | lsm.h | 67 enum sid_policy_type _setid_policy_lookup(struct setid_ruleset *policy,
|
H A D | lsm.c | 32 enum sid_policy_type _setid_policy_lookup(struct setid_ruleset *policy, in _setid_policy_lookup() function 84 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset() 186 if (_setid_policy_lookup(pol, rule->src_id, rule->dst_id) == SIDPOL_ALLOWED) { in handle_policy_update()
|
/kernel/linux/linux-6.6/security/safesetid/ |
H A D | lsm.h | 67 enum sid_policy_type _setid_policy_lookup(struct setid_ruleset *policy,
|
H A D | lsm.c | 32 enum sid_policy_type _setid_policy_lookup(struct setid_ruleset *policy, in _setid_policy_lookup() function 84 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset() 186 if (_setid_policy_lookup(pol, rule->src_id, rule->dst_id) == SIDPOL_ALLOWED) { in handle_policy_update()
|
Completed in 3 milliseconds