/security/selinux/include/ |
D | netlabel.h | 49 u16 family, 53 u16 family, 56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 57 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family); 58 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family); 61 u16 family, 94 u16 family, in selinux_netlbl_skbuff_getsid() argument 103 u16 family, in selinux_netlbl_skbuff_setsid() argument 116 u16 family) in selinux_netlbl_inet_conn_request() argument 120 static inline void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) in selinux_netlbl_inet_csk_clone() argument [all …]
|
D | netnode.h | 30 int sel_netnode_sid(void *addr, u16 family, u32 *sid);
|
D | objsec.h | 91 u16 family; /* address family */ member
|
/security/selinux/ |
D | netnode.c | 114 static struct sel_netnode *sel_netnode_find(const void *addr, u16 family) in sel_netnode_find() argument 119 switch (family) { in sel_netnode_find() 132 if (node->nsec.family == family) in sel_netnode_find() 133 switch (family) { in sel_netnode_find() 160 switch (node->nsec.family) { in sel_netnode_insert() 199 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) in sel_netnode_sid_slow() argument 206 node = sel_netnode_find(addr, family); in sel_netnode_sid_slow() 215 switch (family) { in sel_netnode_sid_slow() 232 new->nsec.family = family; in sel_netnode_sid_slow() 261 int sel_netnode_sid(void *addr, u16 family, u32 *sid) in sel_netnode_sid() argument [all …]
|
D | netlabel.c | 176 u16 family, in selinux_netlbl_skbuff_getsid() argument 189 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid() 212 u16 family, in selinux_netlbl_skbuff_setsid() argument 237 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid() 256 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument 261 if (family != PF_INET) in selinux_netlbl_inet_conn_request() 284 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) in selinux_netlbl_inet_csk_clone() argument 288 if (family == PF_INET) in selinux_netlbl_inet_csk_clone() 304 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family) in selinux_netlbl_socket_post_create() argument 310 if (family != PF_INET) in selinux_netlbl_socket_post_create() [all …]
|
D | hooks.c | 1081 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument 1083 switch (family) { in socket_type_to_security_class() 3814 switch (ad->u.net->family) { in selinux_parse_skb() 3864 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument 3872 selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); in selinux_skb_peerlbl_sid() 3918 static int selinux_socket_create(int family, int type, in selinux_socket_create() argument 3929 secclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_create() 3937 static int selinux_socket_post_create(struct socket *sock, int family, in selinux_socket_post_create() argument 3945 isec->sclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_post_create() 3961 err = selinux_netlbl_socket_post_create(sock->sk, family); in selinux_socket_post_create() [all …]
|
/security/tomoyo/ |
D | network.c | 363 const char *family, const u8 protocol, in tomoyo_audit_net_log() argument 366 return tomoyo_supervisor(r, "network %s %s %s %s\n", family, in tomoyo_audit_net_log() 623 u8 family; in tomoyo_sock_family() local 627 family = sk->sk_family; in tomoyo_sock_family() 628 switch (family) { in tomoyo_sock_family() 632 return family; in tomoyo_sock_family() 648 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_listen_permission() local 653 if (!family || (type != SOCK_STREAM && type != SOCK_SEQPACKET)) in tomoyo_socket_listen_permission() 664 if (family == PF_UNIX) in tomoyo_socket_listen_permission() 684 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_connect_permission() local [all …]
|
/security/smack/ |
D | smack_lsm.c | 1756 static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) in smack_sk_alloc_security() argument 1950 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send() 2041 static int smack_socket_post_create(struct socket *sock, int family, in smack_socket_post_create() argument 2044 if (family != PF_INET || sock->sk == NULL) in smack_socket_post_create() 3024 ad.a.u.net->family = sk->sk_family; in smack_socket_sock_rcv_skb() 3091 int family = PF_UNSPEC; in smack_socket_getpeersec_dgram() local 3097 family = PF_INET; in smack_socket_getpeersec_dgram() 3099 family = PF_INET6; in smack_socket_getpeersec_dgram() 3101 if (family == PF_UNSPEC && sock != NULL) in smack_socket_getpeersec_dgram() 3102 family = sock->sk->sk_family; in smack_socket_getpeersec_dgram() [all …]
|
/security/ |
D | security.c | 1041 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument 1043 return security_ops->socket_create(family, type, protocol, kern); in security_socket_create() 1046 int security_socket_post_create(struct socket *sock, int family, in security_socket_post_create() argument 1049 return security_ops->socket_post_create(sock, family, type, in security_socket_post_create() 1127 int security_sk_alloc(struct sock *sk, int family, gfp_t priority) in security_sk_alloc() argument 1129 return security_ops->sk_alloc_security(sk, family, priority); in security_sk_alloc()
|
D | capability.c | 586 static int cap_socket_create(int family, int type, int protocol, int kern) in cap_socket_create() argument 591 static int cap_socket_post_create(struct socket *sock, int family, int type, in cap_socket_post_create() argument 673 static int cap_sk_alloc_security(struct sock *sk, int family, gfp_t priority) in cap_sk_alloc_security() argument
|
D | lsm_audit.c | 348 switch (a->u.net->family) { in dump_common_audit_data()
|