/security/ |
D | lsm_audit.c | 49 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata() 50 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata() 64 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 65 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 73 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 74 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 82 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata() 83 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata() 90 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() 91 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata() [all …]
|
D | Kconfig.hardening | 17 * https://grsecurity.net/ 18 * https://pax.grsecurity.net/ 177 * https://grsecurity.net/ 178 * https://pax.grsecurity.net/
|
D | Kconfig | 123 See <http://tboot.sourceforge.net> for more information about tboot.
|
/security/smack/ |
D | smack_netfilter.c | 75 static int __net_init smack_nf_register(struct net *net) in smack_nf_register() argument 77 return nf_register_net_hooks(net, smack_nf_ops, in smack_nf_register() 81 static void __net_exit smack_nf_unregister(struct net *net) in smack_nf_unregister() argument 83 nf_unregister_net_hooks(net, smack_nf_ops, ARRAY_SIZE(smack_nf_ops)); in smack_nf_unregister()
|
D | smack.h | 456 char type, struct lsm_network_audit *net) in smk_ad_init_net() argument 459 memset(net, 0, sizeof(*net)); in smk_ad_init_net() 460 a->a.u.net = net; in smk_ad_init_net() 486 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
|
D | smack_lsm.c | 2491 struct lsm_network_audit net; in smack_netlabel_send() local 2493 smk_ad_init_net(&ad, __func__, LSM_AUDIT_DATA_NET, &net); in smack_netlabel_send() 2494 ad.a.u.net->family = sap->sin_family; in smack_netlabel_send() 2495 ad.a.u.net->dport = sap->sin_port; in smack_netlabel_send() 2496 ad.a.u.net->v4info.daddr = sap->sin_addr.s_addr; in smack_netlabel_send() 2527 struct lsm_network_audit net; in smk_ipv6_check() local 2533 smk_ad_init_net(&ad, __func__, LSM_AUDIT_DATA_NET, &net); in smk_ipv6_check() 2534 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 2535 ad.a.u.net->dport = address->sin6_port; in smk_ipv6_check() 2537 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check() [all …]
|
/security/apparmor/ |
D | net.c | 76 if (address_family_names[sa->u.net->family]) in audit_net_cb() 77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb() 79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb() 81 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb() 82 audit_log_string(ab, sock_type_names[aad(sa)->net.type]); in audit_net_cb() 84 audit_log_format(ab, "\"unknown(%d)\"", aad(sa)->net.type); in audit_net_cb() 85 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb()
|
D | Makefile | 8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o 98 $(obj)/net.o : $(obj)/net_names.h 107 $(srctree)/include/linux/net.h \
|
D | lsm.c | 1674 static int __net_init apparmor_nf_register(struct net *net) in apparmor_nf_register() argument 1678 ret = nf_register_net_hooks(net, apparmor_nf_ops, in apparmor_nf_register() 1683 static void __net_exit apparmor_nf_unregister(struct net *net) in apparmor_nf_unregister() argument 1685 nf_unregister_net_hooks(net, apparmor_nf_ops, in apparmor_nf_unregister()
|
/security/selinux/include/ |
D | xfrm.h | 48 struct net *net; in selinux_xfrm_notify_policyload() local 51 for_each_net(net) in selinux_xfrm_notify_policyload() 52 rt_genid_bump_all(net); in selinux_xfrm_notify_policyload()
|
D | netif.h | 21 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid);
|
D | objsec.h | 85 struct net *ns; /* network namespace */
|
/security/selinux/ |
D | netif.c | 53 static inline u32 sel_netif_hashfn(const struct net *ns, int ifindex) in sel_netif_hashfn() 68 static inline struct sel_netif *sel_netif_find(const struct net *ns, in sel_netif_find() 133 static int sel_netif_sid_slow(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid_slow() 192 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid() 218 static void sel_netif_kill(const struct net *ns, int ifindex) in sel_netif_kill()
|
D | hooks.c | 4243 ad->u.net->v4info.saddr = ih->saddr; in selinux_parse_skb_ipv4() 4244 ad->u.net->v4info.daddr = ih->daddr; in selinux_parse_skb_ipv4() 4262 ad->u.net->sport = th->source; in selinux_parse_skb_ipv4() 4263 ad->u.net->dport = th->dest; in selinux_parse_skb_ipv4() 4278 ad->u.net->sport = uh->source; in selinux_parse_skb_ipv4() 4279 ad->u.net->dport = uh->dest; in selinux_parse_skb_ipv4() 4294 ad->u.net->sport = dh->dccph_sport; in selinux_parse_skb_ipv4() 4295 ad->u.net->dport = dh->dccph_dport; in selinux_parse_skb_ipv4() 4311 ad->u.net->sport = sh->source; in selinux_parse_skb_ipv4() 4312 ad->u.net->dport = sh->dest; in selinux_parse_skb_ipv4() [all …]
|
/security/apparmor/include/ |
D | net.h | 63 NAME.u.net = &(NAME ## _net); \ 64 aad(&NAME)->net.type = (T); \ 65 aad(&NAME)->net.protocol = (P)
|
D | audit.h | 138 } net; member
|
/security/integrity/ima/ |
D | Kconfig | 149 <http://linux-ima.sourceforge.net>
|