Home
last modified time | relevance | path

Searched refs:u (Results 1 – 15 of 15) sorted by relevance

/security/
Dlsm_audit.c52 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata()
53 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata()
67 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata()
68 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata()
76 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata()
77 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata()
85 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata()
86 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata()
93 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata()
94 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata()
[all …]
/security/selinux/ss/
Davtab.c86 *xperms = *(datum->u.xperms); in avtab_insert_node()
87 newnode->datum.u.xperms = xperms; in avtab_insert_node()
89 newnode->datum.u.data = datum->u.data; in avtab_insert_node()
294 temp->datum.u.xperms); in avtab_destroy()
465 datum.u.data = le32_to_cpu(buf32[items++]); in avtab_read_item()
533 datum.u.xperms = &xperms; in avtab_read_item()
540 datum.u.data = le32_to_cpu(*buf32); in avtab_read_item()
543 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item()
603 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item()
616 rc = put_entry(&cur->datum.u.xperms->specified, sizeof(u8), 1, fp); in avtab_write_item()
[all …]
Dservices.c617 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers()
620 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers()
621 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers()
624 node->datum.u.xperms->driver); in services_compute_xperms_drivers()
685 avd->allowed |= node->datum.u.data; in context_struct_compute_av()
687 avd->auditallow |= node->datum.u.data; in context_struct_compute_av()
689 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av()
955 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_decision()
956 if (xpermd->driver != node->datum.u.xperms->driver) in services_compute_xperms_decision()
958 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_decision()
[all …]
Dpolicydb.c794 kfree(c->u.name); in ocontext_destroy()
914 c->u.name); in policydb_load_isids()
921 c->u.name); in policydb_load_isids()
2062 rc = str_read(&newc->u.name, GFP_KERNEL, fp, len); in genfs_read()
2078 if (!strcmp(newc->u.name, c->u.name) && in genfs_read()
2082 genfs->fstype, c->u.name); in genfs_read()
2085 len = strlen(newc->u.name); in genfs_read()
2086 len2 = strlen(c->u.name); in genfs_read()
2156 rc = str_read(&c->u.name, GFP_KERNEL, fp, len); in ocontext_read()
2171 c->u.port.protocol = le32_to_cpu(buf[0]); in ocontext_read()
[all …]
Davtab.h77 } u; member
Dconditional.c651 avd->allowed |= node->datum.u.data; in cond_compute_av()
659 avd->auditdeny &= node->datum.u.data; in cond_compute_av()
662 avd->auditallow |= node->datum.u.data; in cond_compute_av()
Dpolicydb.h199 } u; member
/security/smack/
Dsmack.h442 a->a.u.net = net; in smk_ad_init_net()
448 a->a.u.tsk = t; in smk_ad_setfield_u_tsk()
453 a->a.u.dentry = d; in smk_ad_setfield_u_fs_path_dentry()
458 a->a.u.inode = i; in smk_ad_setfield_u_fs_inode()
463 a->a.u.path = p; in smk_ad_setfield_u_fs_path()
468 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
Dsmack_lsm.c2524 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send()
2525 ad.a.u.net->dport = sap->sin_port; in smack_netlabel_send()
2526 ad.a.u.net->v4info.daddr = sap->sin_addr.s_addr; in smack_netlabel_send()
2565 ad.a.u.net->family = PF_INET6; in smk_ipv6_check()
2566 ad.a.u.net->dport = ntohs(address->sin6_port); in smk_ipv6_check()
2568 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check()
2570 ad.a.u.net->v6info.daddr = address->sin6_addr; in smk_ipv6_check()
2999 ad.a.u.ipc_id = shp->shm_perm.id; in smk_curacc_shm()
3126 ad.a.u.ipc_id = sma->sem_perm.id; in smk_curacc_sem()
3259 ad.a.u.ipc_id = msq->q_perm.id; in smk_curacc_msq()
[all …]
/security/selinux/
Dhooks.c1752 ad.u.cap = cap; in cred_has_capability()
1810 ad.u.dentry = dentry; in dentry_has_perm()
1826 ad.u.path = *path; in path_has_perm()
1839 ad.u.file = file; in file_path_has_perm()
1866 ad.u.file = file; in file_has_perm()
1936 ad.u.dentry = dentry; in may_create()
1978 ad.u.dentry = dentry; in may_link()
2025 ad.u.dentry = old_dentry; in may_rename()
2041 ad.u.dentry = new_dentry; in may_rename()
2192 ad.u.path = file->f_path; in selinux_binder_transfer_file()
[all …]
/security/apparmor/
Dcapability.c53 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb()
157 sa.u.cap = cap; in aa_capable()
Daudit.c158 sa->type == LSM_AUDIT_DATA_TASK && sa->u.tsk ? in aa_audit()
159 sa->u.tsk : current); in aa_audit()
Dfile.c111 sa.u.tsk = NULL; in aa_audit_file()
119 sa.u.tsk = NULL; in aa_audit_file()
/security/apparmor/include/
Daudit.h159 .u.tsk = NULL, \
/security/tomoyo/
Dnetwork.c595 struct tomoyo_unix_addr_info *u = &address->unix0; in tomoyo_check_unix_address() local
599 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address()
600 u->addr_len = addr_len; in tomoyo_check_unix_address()