• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/

Lines Matching refs:security

2  *  Simplified MAC Kernel (smack) security module
36 #define task_security(task) (task_cred_xxx((task), security))
62 * new_inode_smack - allocate an inode security blob
857 * smack_inode_getsecid - Extract inode's security id
892 * smack_file_alloc_security - assign a file security blob
895 * The security blob for a file is a pointer to the master
907 * smack_file_free_security - clear a file security blob
910 * The security blob for a file is a pointer to the master
1004 * smack_file_set_fowner - set the file security blob value
1032 char *tsp = tsk->cred->security;
1079 * smack_cred_alloc_blank - "allocate" blank task-level security credentials
1089 cred->security = NULL;
1095 * smack_cred_free - "free" task-level security credentials
1104 cred->security = NULL;
1118 new->security = old->security;
1131 new->security = old->security;
1137 * @secid: specifies the security ID to be set
1139 * Set the security data for a kernel service.
1148 new->security = smack;
1165 new->security = isp->smk_inode;
1395 * Sets the smack pointer in the inode security blob
1750 * smack_msg_msg_alloc_security - Set the security blob for msg_msg
1757 msg->security = current_security();
1762 * smack_msg_msg_free_security - Clear the security blob for msg_msg
1769 msg->security = NULL;
1780 return (char *)shp->shm_perm.security;
1784 * smack_shm_alloc_security - Set the security blob for shm
1793 isp->security = current_security();
1798 * smack_shm_free_security - Clear the security blob for shm
1807 isp->security = NULL;
1903 return (char *)sma->sem_perm.security;
1907 * smack_sem_alloc_security - Set the security blob for sem
1916 isp->security = current_security();
1921 * smack_sem_free_security - Clear the security blob for sem
1930 isp->security = NULL;
2025 * smack_msg_alloc_security - Set the security blob for msg
2034 kisp->security = current_security();
2039 * smack_msg_free_security - Clear the security blob for msg
2048 kisp->security = NULL;
2059 return (char *)msq->q_perm.security;
2171 char *isp = ipp->security;
2183 * smack_ipc_getsecid - Extract smack security id
2189 char *smack = ipp->security;
2199 * Set the inode's security blob if it hasn't been done already.
2409 new->security = newsmack;
2594 * This is the simplist possible security model
2803 * Key management security hooks
2812 * smack_key_alloc - Set the key security blob
2824 key->security = cred->security;
2829 * smack_key_free - Clear the key security blob
2836 key->security = NULL;
2861 if (keyp->security == NULL)
2866 if (cred->security == NULL)
2873 return smk_access(cred->security, keyp->security,
2944 * @secid: security id for identifying the object to test
3168 /* key management security hooks */
3217 * Set the security state for the initial task.
3220 cred->security = &smack_known_floor.smk_known;