/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | mls.c | 226 * If a def_sid is provided and no MLS field is present, 239 u32 def_sid) in mls_context_to_sid() 252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid() 264 if (def_sid == SECSID_NULL) in mls_context_to_sid() 267 defcon = sidtab_search(s, def_sid); in mls_context_to_sid() 234 mls_context_to_sid(struct policydb *pol, char oldc, char *scontext, struct context *context, struct sidtab *s, u32 def_sid) mls_context_to_sid() argument
|
H A D | mls.h | 43 u32 def_sid);
|
H A D | services.c | 1438 u32 def_sid) in string_to_context_struct() 1497 rc = mls_context_to_sid(pol, oldc, p, ctx, sidtabp, def_sid); in string_to_context_struct() 1514 u32 *sid, u32 def_sid, gfp_t gfp_flags, in security_context_to_sid_core() 1562 &context, def_sid); in security_context_to_sid_core() 1622 * @def_sid: default SID to assign on error 1635 u32 *sid, u32 def_sid, gfp_t gfp_flags) in security_context_to_sid_default() 1638 sid, def_sid, gfp_flags, 1); in security_context_to_sid_default() 1434 string_to_context_struct(struct policydb *pol, struct sidtab *sidtabp, char *scontext, struct context *ctx, u32 def_sid) string_to_context_struct() argument 1512 security_context_to_sid_core(struct selinux_state *state, const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags, int force) security_context_to_sid_core() argument 1633 security_context_to_sid_default(struct selinux_state *state, const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags) security_context_to_sid_default() argument
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | mls.c | 225 * If a def_sid is provided and no MLS field is present, 238 u32 def_sid) in mls_context_to_sid() 252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid() 264 if (def_sid == SECSID_NULL) in mls_context_to_sid() 267 defcon = sidtab_search(s, def_sid); in mls_context_to_sid() 233 mls_context_to_sid(struct policydb *pol, char oldc, char *scontext, struct context *context, struct sidtab *s, u32 def_sid) mls_context_to_sid() argument
|
H A D | mls.h | 43 u32 def_sid);
|
H A D | services.c | 1419 u32 def_sid) in string_to_context_struct() 1478 rc = mls_context_to_sid(pol, oldc, p, ctx, sidtabp, def_sid); in string_to_context_struct() 1494 u32 *sid, u32 def_sid, gfp_t gfp_flags, in security_context_to_sid_core() 1542 &context, def_sid); in security_context_to_sid_core() 1600 * @def_sid: default SID to assign on error 1613 u32 *sid, u32 def_sid, gfp_t gfp_flags) in security_context_to_sid_default() 1616 sid, def_sid, gfp_flags, 1); in security_context_to_sid_default() 1415 string_to_context_struct(struct policydb *pol, struct sidtab *sidtabp, char *scontext, struct context *ctx, u32 def_sid) string_to_context_struct() argument 1493 security_context_to_sid_core(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags, int force) security_context_to_sid_core() argument 1612 security_context_to_sid_default(const char *scontext, u32 scontext_len, u32 *sid, u32 def_sid, gfp_t gfp_flags) security_context_to_sid_default() argument
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | objsec.h | 66 u32 def_sid; /* default SID for labeling */ member
|
H A D | security.h | 331 u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | objsec.h | 65 u32 def_sid; /* default SID for labeling */ member
|
H A D | security.h | 276 u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | hooks.c | 708 if (bad_option(sbsec, DEFCONTEXT_MNT, sbsec->def_sid, in selinux_set_mnt_opts() 847 if (defcontext_sid != sbsec->def_sid) { in selinux_set_mnt_opts() 854 sbsec->def_sid = defcontext_sid; in selinux_set_mnt_opts() 884 if ((oldflags & DEFCONTEXT_MNT) && old->def_sid != new->def_sid) in selinux_cmp_sb_context() 949 newsbsec->def_sid = oldsbsec->def_sid; in selinux_sb_clone_mnt_opts() 1100 rc = show_sid(m, sbsec->def_sid); in selinux_sb_show_options() 1347 u32 def_sid, u32 *sid) in inode_doinit_use_xattr() 1385 *sid = def_sid; in inode_doinit_use_xattr() 1346 inode_doinit_use_xattr(struct inode *inode, struct dentry *dentry, u32 def_sid, u32 *sid) inode_doinit_use_xattr() argument [all...] |
/kernel/linux/linux-5.10/security/selinux/ |
H A D | hooks.c | 687 if (bad_option(sbsec, DEFCONTEXT_MNT, sbsec->def_sid, in selinux_set_mnt_opts() 815 if (defcontext_sid != sbsec->def_sid) { in selinux_set_mnt_opts() 822 sbsec->def_sid = defcontext_sid; in selinux_set_mnt_opts() 852 if ((oldflags & DEFCONTEXT_MNT) && old->def_sid != new->def_sid) in selinux_cmp_sb_context() 910 newsbsec->def_sid = oldsbsec->def_sid; in selinux_sb_clone_mnt_opts() 1088 rc = show_sid(m, sbsec->def_sid); in selinux_sb_show_options() 1332 u32 def_sid, u32 *sid) in inode_doinit_use_xattr() 1370 *sid = def_sid; in inode_doinit_use_xattr() 1331 inode_doinit_use_xattr(struct inode *inode, struct dentry *dentry, u32 def_sid, u32 *sid) inode_doinit_use_xattr() argument [all...] |