/security/selinux/include/ |
D | netlabel.h | 29 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error, 36 u16 family, 40 u16 family, 44 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 45 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family); 47 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family); 50 u16 family, 66 u16 family, in selinux_netlbl_err() argument 86 u16 family, in selinux_netlbl_skbuff_getsid() argument 95 u16 family, in selinux_netlbl_skbuff_setsid() argument [all …]
|
D | netnode.h | 22 int sel_netnode_sid(void *addr, u16 family, u32 *sid);
|
D | classmap.h | 253 #error New address family defined, please update secclass_map.
|
D | objsec.h | 96 u16 family; /* address family */ member
|
/security/selinux/ |
D | netlabel.c | 42 u16 family, in selinux_netlbl_sidlookup_cached() argument 52 netlbl_cache_add(skb, family, secattr); in selinux_netlbl_sidlookup_cached() 141 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error, int gateway) in selinux_netlbl_err() argument 143 netlbl_skbuff_err(skb, family, error, gateway); in selinux_netlbl_err() 189 u16 family, in selinux_netlbl_skbuff_getsid() argument 202 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid() 204 rc = selinux_netlbl_sidlookup_cached(skb, family, in selinux_netlbl_skbuff_getsid() 226 u16 family, in selinux_netlbl_skbuff_setsid() argument 253 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid() 324 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument [all …]
|
D | netnode.c | 104 static struct sel_netnode *sel_netnode_find(const void *addr, u16 family) in sel_netnode_find() argument 109 switch (family) { in sel_netnode_find() 122 if (node->nsec.family == family) in sel_netnode_find() 123 switch (family) { in sel_netnode_find() 150 switch (node->nsec.family) { in sel_netnode_insert() 190 static int sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) in sel_netnode_sid_slow() argument 197 node = sel_netnode_find(addr, family); in sel_netnode_sid_slow() 205 switch (family) { in sel_netnode_sid_slow() 223 new->nsec.family = family; in sel_netnode_sid_slow() 250 int sel_netnode_sid(void *addr, u16 family, u32 *sid) in sel_netnode_sid() argument [all …]
|
D | hooks.c | 1181 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument 1185 switch (family) { in socket_type_to_security_class() 1267 switch (family) { in socket_type_to_security_class() 1325 #error New address family defined, please update this function. in socket_type_to_security_class() 4357 switch (ad->u.net->family) { in selinux_parse_skb() 4407 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument 4417 err = selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); in selinux_skb_peerlbl_sid() 4490 static int selinux_socket_create(int family, int type, in selinux_socket_create() argument 4501 secclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_create() 4510 static int selinux_socket_post_create(struct socket *sock, int family, in selinux_socket_post_create() argument [all …]
|
/security/apparmor/ |
D | net.c | 76 if (address_family_names[sa->u.net->family]) in audit_net_cb() 77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb() 79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb() 107 u32 request, u16 family, int type) in aa_profile_af_perm() argument 113 AA_BUG(family >= AF_MAX); in aa_profile_af_perm() 122 buffer[0] = cpu_to_be16(family); in aa_profile_af_perm() 132 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family, in aa_af_perm() argument 136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm() 139 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm()
|
D | lsm.c | 759 static int apparmor_sk_alloc_security(struct sock *sk, int family, gfp_t flags) in apparmor_sk_alloc_security() argument 801 static int apparmor_socket_create(int family, int type, int protocol, int kern) in apparmor_socket_create() argument 810 error = af_select(family, in apparmor_socket_create() 811 create_perm(label, family, type, protocol), in apparmor_socket_create() 813 family, type, protocol)); in apparmor_socket_create() 829 static int apparmor_socket_post_create(struct socket *sock, int family, in apparmor_socket_post_create() argument
|
/security/tomoyo/ |
D | network.c | 364 const char *family, const u8 protocol, in tomoyo_audit_net_log() argument 367 return tomoyo_supervisor(r, "network %s %s %s %s\n", family, in tomoyo_audit_net_log() 628 u8 family; in tomoyo_sock_family() local 632 family = sk->sk_family; in tomoyo_sock_family() 633 switch (family) { in tomoyo_sock_family() 637 return family; in tomoyo_sock_family() 653 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_listen_permission() local 658 if (!family || (type != SOCK_STREAM && type != SOCK_SEQPACKET)) in tomoyo_socket_listen_permission() 670 if (family == PF_UNIX) in tomoyo_socket_listen_permission() 690 const u8 family = tomoyo_sock_family(sock->sk); in tomoyo_socket_connect_permission() local [all …]
|
/security/apparmor/include/ |
D | net.h | 58 .family = (F)}; \ 93 u32 request, u16 family, int type); 94 int aa_af_perm(struct aa_label *label, const char *op, u32 request, u16 family,
|
/security/smack/ |
D | smack_lsm.c | 2246 static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) in smack_sk_alloc_security() argument 2468 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send() 2509 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 2752 static int smack_socket_post_create(struct socket *sock, int family, in smack_socket_post_create() argument 2769 if (family != PF_INET) in smack_socket_post_create() 3853 u16 family = sk->sk_family; in smack_socket_sock_rcv_skb() local 3861 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in smack_socket_sock_rcv_skb() 3862 family = PF_INET; in smack_socket_sock_rcv_skb() 3865 switch (family) { in smack_socket_sock_rcv_skb() 3883 rc = netlbl_skbuff_getattr(skb, family, &secattr); in smack_socket_sock_rcv_skb() [all …]
|
/security/safesetid/ |
D | Kconfig | 8 SafeSetID is an LSM module that gates the setid family of syscalls to
|
/security/ |
D | security.c | 1974 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument 1976 return call_int_hook(socket_create, 0, family, type, protocol, kern); in security_socket_create() 1979 int security_socket_post_create(struct socket *sock, int family, in security_socket_post_create() argument 1982 return call_int_hook(socket_post_create, 0, sock, family, type, in security_socket_post_create() 2068 int security_sk_alloc(struct sock *sk, int family, gfp_t priority) in security_sk_alloc() argument 2070 return call_int_hook(sk_alloc_security, 0, sk, family, priority); in security_sk_alloc()
|
D | lsm_audit.c | 370 switch (a->u.net->family) { in dump_common_audit_data()
|