Home
last modified time | relevance | path

Searched refs:family (Results 1 – 11 of 11) sorted by relevance

/security/selinux/include/
Dnetlabel.h49 u16 family,
53 u16 family,
56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
57 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family);
58 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family);
61 u16 family,
94 u16 family, in selinux_netlbl_skbuff_getsid() argument
103 u16 family, in selinux_netlbl_skbuff_setsid() argument
116 u16 family) in selinux_netlbl_inet_conn_request() argument
120 static inline void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) in selinux_netlbl_inet_csk_clone() argument
[all …]
Dnetnode.h30 int sel_netnode_sid(void *addr, u16 family, u32 *sid);
Dobjsec.h91 u16 family; /* address family */ member
/security/selinux/
Dnetnode.c114 static struct sel_netnode *sel_netnode_find(const void *addr, u16 family) in sel_netnode_find() argument
119 switch (family) { in sel_netnode_find()
132 if (node->nsec.family == family) in sel_netnode_find()
133 switch (family) { in sel_netnode_find()
160 switch (node->nsec.family) { in sel_netnode_insert()
199 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) in sel_netnode_sid_slow() argument
206 node = sel_netnode_find(addr, family); in sel_netnode_sid_slow()
215 switch (family) { in sel_netnode_sid_slow()
232 new->nsec.family = family; in sel_netnode_sid_slow()
261 int sel_netnode_sid(void *addr, u16 family, u32 *sid) in sel_netnode_sid() argument
[all …]
Dnetlabel.c176 u16 family, in selinux_netlbl_skbuff_getsid() argument
189 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid()
212 u16 family, in selinux_netlbl_skbuff_setsid() argument
237 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid()
256 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument
261 if (family != PF_INET) in selinux_netlbl_inet_conn_request()
284 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) in selinux_netlbl_inet_csk_clone() argument
288 if (family == PF_INET) in selinux_netlbl_inet_csk_clone()
304 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family) in selinux_netlbl_socket_post_create() argument
310 if (family != PF_INET) in selinux_netlbl_socket_post_create()
[all …]
Dhooks.c1081 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument
1083 switch (family) { in socket_type_to_security_class()
3814 switch (ad->u.net->family) { in selinux_parse_skb()
3864 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument
3872 selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); in selinux_skb_peerlbl_sid()
3918 static int selinux_socket_create(int family, int type, in selinux_socket_create() argument
3929 secclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_create()
3937 static int selinux_socket_post_create(struct socket *sock, int family, in selinux_socket_post_create() argument
3945 isec->sclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_post_create()
3961 err = selinux_netlbl_socket_post_create(sock->sk, family); in selinux_socket_post_create()
[all …]
/security/tomoyo/
Dnetwork.c363 const char *family, const u8 protocol, in tomoyo_audit_net_log() argument
366 return tomoyo_supervisor(r, "network %s %s %s %s\n", family, in tomoyo_audit_net_log()
623 u8 family; in tomoyo_sock_family() local
627 family = sk->sk_family; in tomoyo_sock_family()
628 switch (family) { in tomoyo_sock_family()
632 return family; in tomoyo_sock_family()
648 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_listen_permission() local
653 if (!family || (type != SOCK_STREAM && type != SOCK_SEQPACKET)) in tomoyo_socket_listen_permission()
664 if (family == PF_UNIX) in tomoyo_socket_listen_permission()
684 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_connect_permission() local
[all …]
/security/smack/
Dsmack_lsm.c1756 static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) in smack_sk_alloc_security() argument
1950 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send()
2041 static int smack_socket_post_create(struct socket *sock, int family, in smack_socket_post_create() argument
2044 if (family != PF_INET || sock->sk == NULL) in smack_socket_post_create()
3024 ad.a.u.net->family = sk->sk_family; in smack_socket_sock_rcv_skb()
3091 int family = PF_UNSPEC; in smack_socket_getpeersec_dgram() local
3097 family = PF_INET; in smack_socket_getpeersec_dgram()
3099 family = PF_INET6; in smack_socket_getpeersec_dgram()
3101 if (family == PF_UNSPEC && sock != NULL) in smack_socket_getpeersec_dgram()
3102 family = sock->sk->sk_family; in smack_socket_getpeersec_dgram()
[all …]
/security/
Dsecurity.c1041 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument
1043 return security_ops->socket_create(family, type, protocol, kern); in security_socket_create()
1046 int security_socket_post_create(struct socket *sock, int family, in security_socket_post_create() argument
1049 return security_ops->socket_post_create(sock, family, type, in security_socket_post_create()
1127 int security_sk_alloc(struct sock *sk, int family, gfp_t priority) in security_sk_alloc() argument
1129 return security_ops->sk_alloc_security(sk, family, priority); in security_sk_alloc()
Dcapability.c586 static int cap_socket_create(int family, int type, int protocol, int kern) in cap_socket_create() argument
591 static int cap_socket_post_create(struct socket *sock, int family, int type, in cap_socket_post_create() argument
673 static int cap_sk_alloc_security(struct sock *sk, int family, gfp_t priority) in cap_sk_alloc_security() argument
Dlsm_audit.c348 switch (a->u.net->family) { in dump_common_audit_data()