Searched refs:u (Results 1 – 17 of 17) sorted by relevance
/security/ |
D | lsm_audit.c | 49 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata() 50 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata() 64 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 65 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 73 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 74 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 82 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata() 83 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata() 90 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() 91 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata() [all …]
|
/security/selinux/ss/ |
D | avtab.c | 86 *xperms = *(datum->u.xperms); in avtab_insert_node() 87 newnode->datum.u.xperms = xperms; in avtab_insert_node() 89 newnode->datum.u.data = datum->u.data; in avtab_insert_node() 292 temp->datum.u.xperms); in avtab_destroy() 463 datum.u.data = le32_to_cpu(buf32[items++]); in avtab_read_item() 532 datum.u.xperms = &xperms; in avtab_read_item() 539 datum.u.data = le32_to_cpu(*buf32); in avtab_read_item() 542 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item() 602 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item() 615 rc = put_entry(&cur->datum.u.xperms->specified, sizeof(u8), 1, fp); in avtab_write_item() [all …]
|
D | policydb.c | 364 kfree(c->u.name); in ocontext_destroy() 866 c->u.name); in policydb_load_isids() 872 c->u.name); in policydb_load_isids() 885 c->u.name); in policydb_load_isids() 2025 rc = str_read(&newc->u.name, GFP_KERNEL, fp, len); in genfs_read() 2041 if (!strcmp(newc->u.name, c->u.name) && in genfs_read() 2045 genfs->fstype, c->u.name); in genfs_read() 2048 len = strlen(newc->u.name); in genfs_read() 2049 len2 = strlen(c->u.name); in genfs_read() 2119 rc = str_read(&c->u.name, GFP_KERNEL, fp, len); in ocontext_read() [all …]
|
D | services.c | 594 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers() 597 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers() 598 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers() 601 node->datum.u.xperms->driver); in services_compute_xperms_drivers() 662 avd->allowed |= node->datum.u.data; in context_struct_compute_av() 664 avd->auditallow |= node->datum.u.data; in context_struct_compute_av() 666 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 949 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_decision() 950 if (xpermd->driver != node->datum.u.xperms->driver) in services_compute_xperms_decision() 952 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_decision() [all …]
|
D | avtab.h | 74 } u; member
|
D | conditional.c | 644 avd->allowed |= node->datum.u.data; in cond_compute_av() 652 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 655 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
D | policydb.h | 195 } u; member
|
/security/smack/ |
D | smack.h | 465 a->a.u.net = net; in smk_ad_init_net() 471 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 476 a->a.u.dentry = d; in smk_ad_setfield_u_fs_path_dentry() 481 a->a.u.inode = i; in smk_ad_setfield_u_fs_inode() 486 a->a.u.path = p; in smk_ad_setfield_u_fs_path() 491 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
|
D | smack_lsm.c | 2468 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send() 2469 ad.a.u.net->dport = sap->sin_port; in smack_netlabel_send() 2470 ad.a.u.net->v4info.daddr = sap->sin_addr.s_addr; in smack_netlabel_send() 2509 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 2510 ad.a.u.net->dport = ntohs(address->sin6_port); in smk_ipv6_check() 2512 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check() 2514 ad.a.u.net->v6info.daddr = address->sin6_addr; in smk_ipv6_check() 2951 ad.a.u.ipc_id = isp->id; in smk_curacc_shm() 3040 ad.a.u.ipc_id = isp->id; in smk_curacc_sem() 3135 ad.a.u.ipc_id = isp->id; in smk_curacc_msq() [all …]
|
/security/selinux/ |
D | hooks.c | 1643 ad.u.cap = cap; in cred_has_capability() 1703 ad.u.dentry = dentry; in dentry_has_perm() 1719 ad.u.path = *path; in path_has_perm() 1732 ad.u.file = file; in file_path_has_perm() 1759 ad.u.file = file; in file_has_perm() 1831 ad.u.dentry = dentry; in may_create() 1876 ad.u.dentry = dentry; in may_link() 1925 ad.u.dentry = old_dentry; in may_rename() 1944 ad.u.dentry = new_dentry; in may_rename() 2103 ad.u.path = file->f_path; in selinux_binder_transfer_file() [all …]
|
/security/apparmor/ |
D | capability.c | 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 153 sa.u.cap = cap; in aa_capable()
|
D | net.c | 76 if (address_family_names[sa->u.net->family]) in audit_net_cb() 77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb() 79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb()
|
D | audit.c | 154 sa->type == LSM_AUDIT_DATA_TASK && sa->u.tsk ? in aa_audit() 155 sa->u.tsk : current); in aa_audit()
|
D | file.c | 109 sa.u.tsk = NULL; in aa_audit_file() 117 sa.u.tsk = NULL; in aa_audit_file()
|
/security/apparmor/include/ |
D | net.h | 63 NAME.u.net = &(NAME ## _net); \
|
D | audit.h | 164 .u.tsk = NULL, \
|
/security/tomoyo/ |
D | network.c | 597 struct tomoyo_unix_addr_info *u = &address->unix0; in tomoyo_check_unix_address() local 603 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address() 604 u->addr_len = addr_len; in tomoyo_check_unix_address()
|