Home
last modified time | relevance | path

Searched refs:family (Results 1 – 15 of 15) sorted by relevance

/security/selinux/include/
Dnetlabel.h29 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error,
36 u16 family,
40 u16 family,
44 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
45 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family);
47 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family);
50 u16 family,
66 u16 family, in selinux_netlbl_err() argument
86 u16 family, in selinux_netlbl_skbuff_getsid() argument
95 u16 family, in selinux_netlbl_skbuff_setsid() argument
[all …]
Dnetnode.h22 int sel_netnode_sid(void *addr, u16 family, u32 *sid);
Dclassmap.h253 #error New address family defined, please update secclass_map.
Dobjsec.h96 u16 family; /* address family */ member
/security/selinux/
Dnetlabel.c42 u16 family, in selinux_netlbl_sidlookup_cached() argument
52 netlbl_cache_add(skb, family, secattr); in selinux_netlbl_sidlookup_cached()
141 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error, int gateway) in selinux_netlbl_err() argument
143 netlbl_skbuff_err(skb, family, error, gateway); in selinux_netlbl_err()
189 u16 family, in selinux_netlbl_skbuff_getsid() argument
202 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid()
204 rc = selinux_netlbl_sidlookup_cached(skb, family, in selinux_netlbl_skbuff_getsid()
226 u16 family, in selinux_netlbl_skbuff_setsid() argument
253 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid()
324 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument
[all …]
Dnetnode.c104 static struct sel_netnode *sel_netnode_find(const void *addr, u16 family) in sel_netnode_find() argument
109 switch (family) { in sel_netnode_find()
122 if (node->nsec.family == family) in sel_netnode_find()
123 switch (family) { in sel_netnode_find()
150 switch (node->nsec.family) { in sel_netnode_insert()
190 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) in sel_netnode_sid_slow() argument
197 node = sel_netnode_find(addr, family); in sel_netnode_sid_slow()
205 switch (family) { in sel_netnode_sid_slow()
223 new->nsec.family = family; in sel_netnode_sid_slow()
250 int sel_netnode_sid(void *addr, u16 family, u32 *sid) in sel_netnode_sid() argument
[all …]
Dhooks.c1181 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument
1185 switch (family) { in socket_type_to_security_class()
1267 switch (family) { in socket_type_to_security_class()
1325 #error New address family defined, please update this function. in socket_type_to_security_class()
4357 switch (ad->u.net->family) { in selinux_parse_skb()
4407 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument
4417 err = selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); in selinux_skb_peerlbl_sid()
4490 static int selinux_socket_create(int family, int type, in selinux_socket_create() argument
4501 secclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_create()
4510 static int selinux_socket_post_create(struct socket *sock, int family, in selinux_socket_post_create() argument
[all …]
/security/apparmor/
Dnet.c76 if (address_family_names[sa->u.net->family]) in audit_net_cb()
77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb()
79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb()
107 u32 request, u16 family, int type) in aa_profile_af_perm() argument
113 AA_BUG(family >= AF_MAX); in aa_profile_af_perm()
122 buffer[0] = cpu_to_be16(family); in aa_profile_af_perm()
132 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument
136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
139 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm()
Dlsm.c759 static int apparmor_sk_alloc_security(struct sock *sk, int family, gfp_t flags) in apparmor_sk_alloc_security() argument
801 static int apparmor_socket_create(int family, int type, int protocol, int kern) in apparmor_socket_create() argument
810 error = af_select(family, in apparmor_socket_create()
811 create_perm(label, family, type, protocol), in apparmor_socket_create()
813 family, type, protocol)); in apparmor_socket_create()
829 static int apparmor_socket_post_create(struct socket *sock, int family, in apparmor_socket_post_create() argument
/security/tomoyo/
Dnetwork.c364 const char *family, const u8 protocol, in tomoyo_audit_net_log() argument
367 return tomoyo_supervisor(r, "network %s %s %s %s\n", family, in tomoyo_audit_net_log()
628 u8 family; in tomoyo_sock_family() local
632 family = sk->sk_family; in tomoyo_sock_family()
633 switch (family) { in tomoyo_sock_family()
637 return family; in tomoyo_sock_family()
653 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_listen_permission() local
658 if (!family || (type != SOCK_STREAM && type != SOCK_SEQPACKET)) in tomoyo_socket_listen_permission()
670 if (family == PF_UNIX) in tomoyo_socket_listen_permission()
690 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_connect_permission() local
[all …]
/security/apparmor/include/
Dnet.h58 .family = (F)}; \
93 u32 request, u16 family, int type);
94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family,
/security/smack/
Dsmack_lsm.c2246 static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) in smack_sk_alloc_security() argument
2468 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send()
2509 ad.a.u.net->family = PF_INET6; in smk_ipv6_check()
2752 static int smack_socket_post_create(struct socket *sock, int family, in smack_socket_post_create() argument
2769 if (family != PF_INET) in smack_socket_post_create()
3853 u16 family = sk->sk_family; in smack_socket_sock_rcv_skb() local
3861 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in smack_socket_sock_rcv_skb()
3862 family = PF_INET; in smack_socket_sock_rcv_skb()
3865 switch (family) { in smack_socket_sock_rcv_skb()
3883 rc = netlbl_skbuff_getattr(skb, family, &secattr); in smack_socket_sock_rcv_skb()
[all …]
/security/safesetid/
DKconfig8 SafeSetID is an LSM module that gates the setid family of syscalls to
/security/
Dsecurity.c1974 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument
1976 return call_int_hook(socket_create, 0, family, type, protocol, kern); in security_socket_create()
1979 int security_socket_post_create(struct socket *sock, int family, in security_socket_post_create() argument
1982 return call_int_hook(socket_post_create, 0, sock, family, type, in security_socket_post_create()
2068 int security_sk_alloc(struct sock *sk, int family, gfp_t priority) in security_sk_alloc() argument
2070 return call_int_hook(sk_alloc_security, 0, sk, family, priority); in security_sk_alloc()
Dlsm_audit.c370 switch (a->u.net->family) { in dump_common_audit_data()