Searched refs:u (Results 1 – 18 of 18) sorted by relevance
/security/ |
D | lsm_audit.c | 50 ad->u.net->v4info.saddr = ih->saddr; in ipv4_skb_to_auditdata() 51 ad->u.net->v4info.daddr = ih->daddr; in ipv4_skb_to_auditdata() 65 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 66 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 74 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 75 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 83 ad->u.net->sport = dh->dccph_sport; in ipv4_skb_to_auditdata() 84 ad->u.net->dport = dh->dccph_dport; in ipv4_skb_to_auditdata() 91 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() 92 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata() [all …]
|
/security/keys/trusted-keys/ |
D | trusted_tee.c | 95 param[0].u.memref.shm = reg_shm_in; in trusted_tee_seal() 96 param[0].u.memref.size = p->key_len; in trusted_tee_seal() 97 param[0].u.memref.shm_offs = 0; in trusted_tee_seal() 99 param[1].u.memref.shm = reg_shm_out; in trusted_tee_seal() 100 param[1].u.memref.size = sizeof(p->blob); in trusted_tee_seal() 101 param[1].u.memref.shm_offs = 0; in trusted_tee_seal() 109 p->blob_len = param[1].u.memref.size; in trusted_tee_seal() 156 param[0].u.memref.shm = reg_shm_in; in trusted_tee_unseal() 157 param[0].u.memref.size = p->blob_len; in trusted_tee_unseal() 158 param[0].u.memref.shm_offs = 0; in trusted_tee_unseal() [all …]
|
/security/selinux/ss/ |
D | avtab.c | 86 *xperms = *(datum->u.xperms); in avtab_insert_node() 87 newnode->datum.u.xperms = xperms; in avtab_insert_node() 89 newnode->datum.u.data = datum->u.data; in avtab_insert_node() 294 temp->datum.u.xperms); in avtab_destroy() 476 datum.u.data = le32_to_cpu(buf32[items++]); in avtab_read_item() 545 datum.u.xperms = &xperms; in avtab_read_item() 552 datum.u.data = le32_to_cpu(*buf32); in avtab_read_item() 555 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item() 615 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item() 628 rc = put_entry(&cur->datum.u.xperms->specified, sizeof(u8), 1, fp); in avtab_write_item() [all …]
|
D | services.c | 604 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers() 607 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers() 608 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers() 611 node->datum.u.xperms->driver); in services_compute_xperms_drivers() 670 avd->allowed |= node->datum.u.data; in context_struct_compute_av() 672 avd->auditallow |= node->datum.u.data; in context_struct_compute_av() 674 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 968 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_decision() 969 if (xpermd->driver != node->datum.u.xperms->driver) in services_compute_xperms_decision() 971 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_decision() [all …]
|
D | policydb.c | 376 kfree(c->u.name); in ocontext_destroy() 2168 rc = str_read(&newc->u.name, GFP_KERNEL, fp, len); in genfs_read() 2184 if (!strcmp(newc->u.name, c->u.name) && in genfs_read() 2188 genfs->fstype, c->u.name); in genfs_read() 2191 len = strlen(newc->u.name); in genfs_read() 2192 len2 = strlen(c->u.name); in genfs_read() 2262 rc = str_read(&c->u.name, GFP_KERNEL, fp, len); in ocontext_read() 2277 c->u.port.protocol = le32_to_cpu(buf[0]); in ocontext_read() 2278 c->u.port.low_port = le32_to_cpu(buf[1]); in ocontext_read() 2279 c->u.port.high_port = le32_to_cpu(buf[2]); in ocontext_read() [all …]
|
D | avtab.h | 74 } u; member
|
D | conditional.c | 588 avd->allowed |= node->datum.u.data; in cond_compute_av() 596 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 599 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
D | policydb.h | 199 } u; member
|
/security/smack/ |
D | smack.h | 473 a->a.u.net = net; in smk_ad_init_net() 479 a->a.u.tsk = t; in smk_ad_setfield_u_tsk() 484 a->a.u.dentry = d; in smk_ad_setfield_u_fs_path_dentry() 489 a->a.u.inode = i; in smk_ad_setfield_u_fs_inode() 494 a->a.u.path = p; in smk_ad_setfield_u_fs_path() 499 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
|
D | smack_lsm.c | 2497 ad.a.u.net->family = sap->sin_family; in smk_ipv4_check() 2498 ad.a.u.net->dport = sap->sin_port; in smk_ipv4_check() 2499 ad.a.u.net->v4info.daddr = sap->sin_addr.s_addr; in smk_ipv4_check() 2536 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 2537 ad.a.u.net->dport = address->sin6_port; in smk_ipv6_check() 2539 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check() 2541 ad.a.u.net->v6info.daddr = address->sin6_addr; in smk_ipv6_check() 2971 ad.a.u.ipc_id = isp->id; in smk_curacc_shm() 3060 ad.a.u.ipc_id = isp->id; in smk_curacc_sem() 3155 ad.a.u.ipc_id = isp->id; in smk_curacc_msq() [all …]
|
/security/selinux/ |
D | hooks.c | 1659 ad.u.cap = cap; in cred_has_capability() 1719 ad.u.dentry = dentry; in dentry_has_perm() 1735 ad.u.path = *path; in path_has_perm() 1748 ad.u.file = file; in file_path_has_perm() 1775 ad.u.file = file; in file_has_perm() 1848 ad.u.dentry = dentry; in may_create() 1893 ad.u.dentry = dentry; in may_link() 1942 ad.u.dentry = old_dentry; in may_rename() 1961 ad.u.dentry = new_dentry; in may_rename() 2114 ad.u.path = file->f_path; in selinux_binder_transfer_file() [all …]
|
/security/apparmor/ |
D | capability.c | 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 153 sa.u.cap = cap; in aa_capable()
|
D | net.c | 75 if (address_family_names[sa->u.net->family]) in audit_net_cb() 77 address_family_names[sa->u.net->family]); in audit_net_cb() 80 sa->u.net->family); in audit_net_cb()
|
D | audit.c | 152 sa->type == LSM_AUDIT_DATA_TASK && sa->u.tsk ? in aa_audit() 153 sa->u.tsk : current); in aa_audit()
|
D | file.c | 100 sa.u.tsk = NULL; in aa_audit_file() 108 sa.u.tsk = NULL; in aa_audit_file()
|
/security/apparmor/include/ |
D | net.h | 63 NAME.u.net = &(NAME ## _net); \
|
D | audit.h | 164 .u.tsk = NULL, \
|
/security/tomoyo/ |
D | network.c | 597 struct tomoyo_unix_addr_info *u = &address->unix0; in tomoyo_check_unix_address() local 603 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address() 604 u->addr_len = addr_len; in tomoyo_check_unix_address()
|