Searched refs:u (Results 1 – 15 of 15) sorted by relevance
/security/ |
D | lsm_audit.c | 52 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata() 53 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata() 67 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 68 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 76 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 77 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 85 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata() 86 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata() 93 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() 94 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata() [all …]
|
/security/selinux/ss/ |
D | avtab.c | 86 *xperms = *(datum->u.xperms); in avtab_insert_node() 87 newnode->datum.u.xperms = xperms; in avtab_insert_node() 89 newnode->datum.u.data = datum->u.data; in avtab_insert_node() 294 temp->datum.u.xperms); in avtab_destroy() 465 datum.u.data = le32_to_cpu(buf32[items++]); in avtab_read_item() 533 datum.u.xperms = &xperms; in avtab_read_item() 540 datum.u.data = le32_to_cpu(*buf32); in avtab_read_item() 543 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item() 603 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item() 616 rc = put_entry(&cur->datum.u.xperms->specified, sizeof(u8), 1, fp); in avtab_write_item() [all …]
|
D | services.c | 617 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers() 620 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers() 621 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers() 624 node->datum.u.xperms->driver); in services_compute_xperms_drivers() 685 avd->allowed |= node->datum.u.data; in context_struct_compute_av() 687 avd->auditallow |= node->datum.u.data; in context_struct_compute_av() 689 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 955 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_decision() 956 if (xpermd->driver != node->datum.u.xperms->driver) in services_compute_xperms_decision() 958 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_decision() [all …]
|
D | policydb.c | 794 kfree(c->u.name); in ocontext_destroy() 914 c->u.name); in policydb_load_isids() 921 c->u.name); in policydb_load_isids() 2062 rc = str_read(&newc->u.name, GFP_KERNEL, fp, len); in genfs_read() 2078 if (!strcmp(newc->u.name, c->u.name) && in genfs_read() 2082 genfs->fstype, c->u.name); in genfs_read() 2085 len = strlen(newc->u.name); in genfs_read() 2086 len2 = strlen(c->u.name); in genfs_read() 2156 rc = str_read(&c->u.name, GFP_KERNEL, fp, len); in ocontext_read() 2171 c->u.port.protocol = le32_to_cpu(buf[0]); in ocontext_read() [all …]
|
D | avtab.h | 77 } u; member
|
D | conditional.c | 651 avd->allowed |= node->datum.u.data; in cond_compute_av() 659 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 662 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
D | policydb.h | 199 } u; member
|
/security/smack/ |
D | smack.h | 442 a->a.u.net = net; in smk_ad_init_net() 448 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 453 a->a.u.dentry = d; in smk_ad_setfield_u_fs_path_dentry() 458 a->a.u.inode = i; in smk_ad_setfield_u_fs_inode() 463 a->a.u.path = p; in smk_ad_setfield_u_fs_path() 468 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
|
D | smack_lsm.c | 2524 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send() 2525 ad.a.u.net->dport = sap->sin_port; in smack_netlabel_send() 2526 ad.a.u.net->v4info.daddr = sap->sin_addr.s_addr; in smack_netlabel_send() 2565 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 2566 ad.a.u.net->dport = ntohs(address->sin6_port); in smk_ipv6_check() 2568 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check() 2570 ad.a.u.net->v6info.daddr = address->sin6_addr; in smk_ipv6_check() 2999 ad.a.u.ipc_id = shp->shm_perm.id; in smk_curacc_shm() 3126 ad.a.u.ipc_id = sma->sem_perm.id; in smk_curacc_sem() 3259 ad.a.u.ipc_id = msq->q_perm.id; in smk_curacc_msq() [all …]
|
/security/selinux/ |
D | hooks.c | 1752 ad.u.cap = cap; in cred_has_capability() 1810 ad.u.dentry = dentry; in dentry_has_perm() 1826 ad.u.path = *path; in path_has_perm() 1839 ad.u.file = file; in file_path_has_perm() 1866 ad.u.file = file; in file_has_perm() 1936 ad.u.dentry = dentry; in may_create() 1978 ad.u.dentry = dentry; in may_link() 2025 ad.u.dentry = old_dentry; in may_rename() 2041 ad.u.dentry = new_dentry; in may_rename() 2192 ad.u.path = file->f_path; in selinux_binder_transfer_file() [all …]
|
/security/apparmor/ |
D | capability.c | 53 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 157 sa.u.cap = cap; in aa_capable()
|
D | audit.c | 158 sa->type == LSM_AUDIT_DATA_TASK && sa->u.tsk ? in aa_audit() 159 sa->u.tsk : current); in aa_audit()
|
D | file.c | 111 sa.u.tsk = NULL; in aa_audit_file() 119 sa.u.tsk = NULL; in aa_audit_file()
|
/security/apparmor/include/ |
D | audit.h | 159 .u.tsk = NULL, \
|
/security/tomoyo/ |
D | network.c | 595 struct tomoyo_unix_addr_info *u = &address->unix0; in tomoyo_check_unix_address() local 599 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address() 600 u->addr_len = addr_len; in tomoyo_check_unix_address()
|