| /security/selinux/ |
| A D | netnode.c | 73 return (addr & (SEL_NETNODE_HASH_SIZE - 1)); in sel_netnode_hashfn_ipv4() 113 idx = sel_netnode_hashfn_ipv6(addr); in sel_netnode_find() 124 if (node->nsec.addr.ipv4 == *(const __be32 *)addr) in sel_netnode_find() 128 if (ipv6_addr_equal(&node->nsec.addr.ipv6, in sel_netnode_find() 129 addr)) in sel_netnode_find() 197 node = sel_netnode_find(addr, family); in sel_netnode_sid_slow() 211 addr, sizeof(struct in_addr), sid); in sel_netnode_sid_slow() 213 new->nsec.addr.ipv4 = *(const __be32 *)addr; in sel_netnode_sid_slow() 217 addr, sizeof(struct in6_addr), sid); in sel_netnode_sid_slow() 219 new->nsec.addr.ipv6 = *(const struct in6_addr *)addr; in sel_netnode_sid_slow() [all …]
|
| A D | netlabel.c | 550 struct sockaddr *addr) in selinux_netlbl_socket_connect_helper() argument 559 if (addr->sa_family == AF_UNSPEC) { in selinux_netlbl_socket_connect_helper() 569 rc = netlbl_conn_setattr(sk, addr, secattr); in selinux_netlbl_socket_connect_helper() 589 struct sockaddr *addr) in selinux_netlbl_socket_connect_locked() argument 597 return selinux_netlbl_socket_connect_helper(sk, addr); in selinux_netlbl_socket_connect_locked() 610 int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr) in selinux_netlbl_socket_connect() argument 615 rc = selinux_netlbl_socket_connect_locked(sk, addr); in selinux_netlbl_socket_connect()
|
| A D | hooks.c | 3956 static int selinux_mmap_addr(unsigned long addr) in selinux_mmap_addr() argument 3960 if (addr < CONFIG_LSM_MMAP_MIN_ADDR) { in selinux_mmap_addr() 5573 struct sockaddr *addr; in selinux_sctp_bind_connect() local 5587 addr = addr_buf; in selinux_sctp_bind_connect() 5588 switch (addr->sa_family) { in selinux_sctp_bind_connect() 5609 err = selinux_socket_bind(sock, addr, len); in selinux_sctp_bind_connect() 5616 err = selinux_socket_connect_helper(sock, addr, len); in selinux_sctp_bind_connect() 5631 err = selinux_netlbl_socket_connect_locked(sk, addr); in selinux_sctp_bind_connect()
|
| /security/tomoyo/ |
| A D | network.c | 510 switch (addr->sa_family) { in tomoyo_check_inet_address() 524 &((struct sockaddr_in *) addr)->sin_addr; in tomoyo_check_inet_address() 553 char *buf = address->unix0.addr; in tomoyo_unix_entry() 564 struct tomoyo_path_info addr; in tomoyo_unix_entry() local 566 addr.name = buf; in tomoyo_unix_entry() 567 tomoyo_fill_path_info(&addr); in tomoyo_unix_entry() 571 r.param.unix_network.address = &addr; in tomoyo_unix_entry() 601 if (addr->sa_family != AF_UNIX) in tomoyo_check_unix_address() 603 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address() 655 struct sockaddr_storage addr; in tomoyo_socket_listen_permission() local [all …]
|
| A D | tomoyo.c | 468 static int tomoyo_socket_connect(struct socket *sock, struct sockaddr *addr, in tomoyo_socket_connect() argument 471 return tomoyo_socket_connect_permission(sock, addr, addr_len); in tomoyo_socket_connect() 483 static int tomoyo_socket_bind(struct socket *sock, struct sockaddr *addr, in tomoyo_socket_bind() argument 486 return tomoyo_socket_bind_permission(sock, addr, addr_len); in tomoyo_socket_bind()
|
| A D | common.h | 995 int tomoyo_socket_bind_permission(struct socket *sock, struct sockaddr *addr, 998 struct sockaddr *addr, int addr_len);
|
| /security/apparmor/ |
| A D | af_unix.c | 72 if (addr) in match_addr() 110 struct unix_address *addr; in aa_sunaddr() local 113 addr = smp_load_acquire(&u->addr); in aa_sunaddr() 114 if (addr) { in aa_sunaddr() 115 *addrlen = addr->len; in aa_sunaddr() 116 return addr->name; in aa_sunaddr() 274 unix_addr(ad->net.addr), in profile_bind_perm() 494 error = valid_addr(addr, addrlen); in aa_unix_bind_perm() 503 ad.net.addr = unix_addr(addr); in aa_unix_bind_perm() 609 ad.net.peer.addr = peer_addr; in unix_peer_perm() [all …]
|
| A D | net.c | 77 struct sockaddr_un *addr, int addrlen) in audit_unix_addr() argument 81 if (!addr || len <= 0) { in audit_unix_addr() 83 } else if (addr->sun_path[0]) { in audit_unix_addr() 85 audit_log_untrustedstring(ab, addr->sun_path); in audit_unix_addr() 89 audit_log_n_hex(ab, &addr->sun_path[1], len - 1); in audit_unix_addr() 92 &addr->sun_path[1]); in audit_unix_addr() 102 if (u && u->addr) { in audit_unix_sk_addr() 106 audit_unix_addr(ab, str, addr, addrlen); in audit_unix_sk_addr() 145 if (ad->net.addr || !ad->common.u.net->sk) in audit_net_cb() 147 unix_addr(ad->net.addr), in audit_net_cb() [all …]
|
| /security/ |
| A D | lsm_audit.c | 154 const struct in6_addr *addr, __be16 port, in print_ipv6_addr() argument 157 if (!ipv6_addr_any(addr)) in print_ipv6_addr() 158 audit_log_format(ab, " %s=%pI6c", name1, addr); in print_ipv6_addr() 163 static inline void print_ipv4_addr(struct audit_buffer *ab, __be32 addr, in print_ipv4_addr() argument 166 if (addr) in print_ipv4_addr() 167 audit_log_format(ab, " %s=%pI4", name1, &addr); in print_ipv4_addr() 289 struct unix_address *addr; in audit_log_lsm_data() local 320 addr = smp_load_acquire(&u->addr); in audit_log_lsm_data() 321 if (!addr) in audit_log_lsm_data() 327 len = addr->len-sizeof(short); in audit_log_lsm_data() [all …]
|
| A D | commoncap.c | 1459 int cap_mmap_addr(unsigned long addr) in cap_mmap_addr() argument 1463 if (addr < dac_mmap_min_addr) { in cap_mmap_addr()
|
| A D | security.c | 3024 int security_mmap_addr(unsigned long addr) in security_mmap_addr() argument 3026 return call_int_hook(mmap_addr, addr); in security_mmap_addr()
|
| /security/selinux/include/ |
| A D | netlabel.h | 49 int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr); 51 struct sockaddr *addr); 126 struct sockaddr *addr) in selinux_netlbl_socket_connect() argument 131 struct sockaddr *addr) in selinux_netlbl_socket_connect_locked() argument
|
| A D | netnode.h | 24 int sel_netnode_sid(const void *addr, u16 family, u32 *sid);
|
| A D | objsec.h | 116 } addr; member
|
| A D | security.h | 314 int security_node_sid(u16 domain, const void *addr, u32 addrlen, u32 *out_sid);
|
| /security/integrity/ |
| A D | iint.c | 26 void *addr, unsigned long count) in integrity_kernel_read() argument 28 return __kernel_read(file, addr, count, &offset); in integrity_kernel_read()
|
| A D | integrity.h | 116 void *addr, unsigned long count);
|
| /security/landlock/ |
| A D | task.c | 249 struct unix_address *addr = unix_sk(sock)->addr; in is_abstract_socket() local 251 if (!addr) in is_abstract_socket() 254 if (addr->len >= offsetof(struct sockaddr_un, sun_path) + 1 && in is_abstract_socket() 255 addr->name->sun_path[0] == '\0') in is_abstract_socket()
|
| /security/apparmor/include/ |
| A D | af_unix.h | 28 #define is_unix_anonymous(U) (!unix_sk(U)->addr) 30 unix_sk(U)->addr->name->sun_path[0])
|
| A D | audit.h | 141 void *addr; member 144 void *addr; member
|
| /security/selinux/ss/ |
| A D | policydb.h | 180 u32 addr; member 184 u32 addr[4]; member
|
| A D | services.c | 2653 static bool match_ipv6_addrmask(const u32 input[4], const u32 addr[4], const u32 mask[4]) in match_ipv6_addrmask() 2658 if (addr[i] != (input[i] & mask[i])) in match_ipv6_addrmask() 2695 u32 addr; in security_node_sid() local 2701 addr = *((const u32 *)addrp); in security_node_sid() 2705 if (c->u.node.addr == (addr & c->u.node.mask)) in security_node_sid() 2718 if (match_ipv6_addrmask(addrp, c->u.node6.addr, in security_node_sid()
|
| A D | policydb.c | 2330 c->u.node.addr = nodebuf[0]; /* network order */ in ocontext_read() 2367 c->u.node6.addr[k] = nodebuf[k]; in ocontext_read() 3367 nodebuf[0] = c->u.node.addr; /* network order */ in ocontext_write() 3393 c->u.node6.addr in ocontext_write()
|
| /security/smack/ |
| A D | smack_lsm.c | 4361 struct sockaddr_in addr; in smack_inet_conn_request() local 4423 addr.sin_addr.s_addr = hdr->saddr; in smack_inet_conn_request() 4425 hskp = smack_ipv4host_label(&addr); in smack_inet_conn_request()
|