/security/smack/ |
D | smack_lsm.c | 425 struct smk_audit_info ad, *saip = NULL; in smk_ptrace_rule_check() local 431 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check() 432 smk_ad_setfield_u_tsk(&ad, tracer); in smk_ptrace_rule_check() 433 saip = &ad; in smk_ptrace_rule_check() 886 struct smk_audit_info ad; in smack_sb_statfs() local 888 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_DENTRY); in smack_sb_statfs() 889 smk_ad_setfield_u_fs_path_dentry(&ad, dentry); in smack_sb_statfs() 891 rc = smk_curacc(sbp->smk_floor, MAY_READ, &ad); in smack_sb_statfs() 1037 struct smk_audit_info ad; in smack_inode_link() local 1040 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_DENTRY); in smack_inode_link() [all …]
|
D | smack_access.c | 314 struct common_audit_data *ad = a; in smack_log_callback() local 315 struct smack_audit_data *sad = ad->smack_audit_data; in smack_log_callback() 317 ad->smack_audit_data->function, in smack_log_callback() 341 int result, struct smk_audit_info *ad) in smack_log() argument 349 struct common_audit_data *a = &ad->a; in smack_log() 388 int result, struct smk_audit_info *ad) in smack_log() argument
|
/security/selinux/ |
D | hooks.c | 1635 struct common_audit_data ad; in cred_has_capability() local 1642 ad.type = LSM_AUDIT_DATA_CAP; in cred_has_capability() 1643 ad.u.cap = cap; in cred_has_capability() 1662 sid, sid, sclass, av, &avd, rc, &ad, 0); in cred_has_capability() 1700 struct common_audit_data ad; in dentry_has_perm() local 1702 ad.type = LSM_AUDIT_DATA_DENTRY; in dentry_has_perm() 1703 ad.u.dentry = dentry; in dentry_has_perm() 1705 return inode_has_perm(cred, inode, av, &ad); in dentry_has_perm() 1716 struct common_audit_data ad; in path_has_perm() local 1718 ad.type = LSM_AUDIT_DATA_PATH; in path_has_perm() [all …]
|
D | xfrm.c | 405 struct common_audit_data *ad) in selinux_xfrm_sock_rcv_skb() argument 428 SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, ad); in selinux_xfrm_sock_rcv_skb() 439 struct common_audit_data *ad, u8 proto) in selinux_xfrm_postroute_last() argument 471 SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, ad); in selinux_xfrm_postroute_last()
|
D | avc.c | 418 struct common_audit_data *ad) in avc_xperms_audit() argument 427 audited, denied, result, ad, 0); in avc_xperms_audit() 665 struct common_audit_data *ad = a; in avc_audit_pre_callback() local 666 struct selinux_audit_data *sad = ad->selinux_audit_data; in avc_audit_pre_callback() 706 struct common_audit_data *ad = a; in avc_audit_post_callback() local 707 struct selinux_audit_data *sad = ad->selinux_audit_data; in avc_audit_post_callback() 1050 u8 driver, u8 xperm, struct common_audit_data *ad) in avc_has_extended_perms() argument 1119 &avd, xpd, xperm, rc, ad); in avc_has_extended_perms()
|
D | netlabel.c | 431 struct common_audit_data *ad) in selinux_netlbl_sock_rcv_skb() argument 464 sksec->sid, nlbl_sid, sksec->sclass, perm, ad); in selinux_netlbl_sock_rcv_skb()
|
/security/ |
D | lsm_audit.c | 40 struct common_audit_data *ad, u8 *proto) in ipv4_skb_to_auditdata() argument 49 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata() 50 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata() 64 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 65 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 73 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 74 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 82 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata() 83 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata() 90 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() [all …]
|
/security/selinux/include/ |
D | xfrm.h | 40 struct common_audit_data *ad); 42 struct common_audit_data *ad, u8 proto); 62 struct common_audit_data *ad) in selinux_xfrm_sock_rcv_skb() argument 68 struct common_audit_data *ad, in selinux_xfrm_postroute_last() argument
|
D | netlabel.h | 51 struct common_audit_data *ad); 134 struct common_audit_data *ad) in selinux_netlbl_sock_rcv_skb() argument
|
D | avc.h | 159 u8 driver, u8 perm, struct common_audit_data *ad);
|