| /security/tomoyo/ |
| A D | network.c | 199 tomoyo_same_ipaddr_union(&p1->address, &p2->address) && in tomoyo_same_inet_acl() 300 e.address.group = in tomoyo_write_inet_network() 383 const __be32 *address = r->param.inet_network.address; in tomoyo_audit_inet_log() local 387 address, (const struct in6_addr *) address); in tomoyo_audit_inet_log() 389 tomoyo_print_ipv4(buf, sizeof(buf), address, address); in tomoyo_audit_inet_log() 433 r->param.inet_network.address, acl->address.group); in tomoyo_check_inet_acl() 472 const u8 type = tomoyo_inet2mac[address->protocol][address->operation]; in tomoyo_inet_entry() 480 r.param.inet_network.address = address->inet.address; in tomoyo_inet_entry() 674 0, &address); in tomoyo_socket_listen_permission() 711 &address); in tomoyo_socket_connect_permission() [all …]
|
| A D | group.c | 63 return tomoyo_same_ipaddr_union(&p1->address, &p2->address); in tomoyo_same_address_group() 109 !tomoyo_parse_ipaddr_union(param, &e.address)) in tomoyo_write_group() 189 bool tomoyo_address_matches_group(const bool is_ipv6, const __be32 *address, in tomoyo_address_matches_group() argument 200 if (member->address.is_ipv6 != is_ipv6) in tomoyo_address_matches_group() 202 if (memcmp(&member->address.ip[0], address, size) > 0 || in tomoyo_address_matches_group() 203 memcmp(address, &member->address.ip[1], size) > 0) in tomoyo_address_matches_group()
|
| A D | common.h | 468 const __be32 *address; member 477 const struct tomoyo_path_info *address; member 563 struct tomoyo_ipaddr_union address; member 767 struct tomoyo_ipaddr_union address; member 927 bool tomoyo_address_matches_group(const bool is_ipv6, const __be32 *address,
|
| A D | gc.c | 219 tomoyo_put_group(entry->address.group); in tomoyo_del_acl()
|
| A D | common.c | 1515 if (ptr->address.group) { in tomoyo_print_entry() 1517 tomoyo_set_string(head, ptr->address.group->group_name in tomoyo_print_entry() 1522 tomoyo_print_ip(buf, sizeof(buf), &ptr->address); in tomoyo_print_entry() 1827 &member->address); in tomoyo_read_group()
|
| /security/landlock/ |
| A D | net.c | 45 struct sockaddr *const address, in current_check_access_socket() argument 69 if (addrlen < offsetofend(typeof(*address), sa_family)) in current_check_access_socket() 72 switch (address->sa_family) { in current_check_access_socket() 80 addr4 = (struct sockaddr_in *)address; in current_check_access_socket() 102 addr6 = (struct sockaddr_in6 *)address; in current_check_access_socket() 123 if (address->sa_family == AF_UNSPEC) { in current_check_access_socket() 152 (struct sockaddr_in *)address; in current_check_access_socket() 185 audit_net.family = address->sa_family; in current_check_access_socket() 199 struct sockaddr *const address, const int addrlen) in hook_socket_bind() argument 201 return current_check_access_socket(sock, address, addrlen, in hook_socket_bind() [all …]
|
| /security/apparmor/include/ |
| A D | af_unix.h | 42 int aa_unix_bind_perm(struct socket *sock, struct sockaddr *address, 44 int aa_unix_connect_perm(struct socket *sock, struct sockaddr *address,
|
| /security/smack/ |
| A D | smack_lsm.c | 2679 struct sockaddr_in6 *address, int act) in smk_ipv6_check() argument 2690 ad.a.u.net->dport = address->sin6_port; in smk_ipv6_check() 2692 ad.a.u.net->v6info.saddr = address->sin6_addr; in smk_ipv6_check() 2718 if (address == NULL) { in smk_ipv6_port_label() 2741 addr6 = (struct sockaddr_in6 *)address; in smk_ipv6_port_label() 2808 skp = smack_ipv6host_label(address); in smk_ipv6_port_check() 2812 object = smack_ipv6host_label(address); in smk_ipv6_port_check() 2828 if (!smk_ipv6_localhost(address)) in smk_ipv6_port_check() 2837 port = ntohs(address->sin6_port); in smk_ipv6_port_check() 3003 address->sa_family != AF_INET6) in smack_socket_bind() [all …]
|
| /security/selinux/include/ |
| A D | classmap.h | 189 #error New address family defined, please update secclass_map.
|
| /security/ |
| A D | Kconfig | 172 int "Low address space for LSM to protect from user allocation" 181 For most ia64, ppc64 and x86 users with lots of address space 185 this low address space will need the permission specific to the
|
| A D | security.c | 4640 struct sockaddr *address, int addrlen) in security_socket_bind() argument 4642 return call_int_hook(socket_bind, sock, address, addrlen); in security_socket_bind() 4657 struct sockaddr *address, int addrlen) in security_socket_connect() argument 4659 return call_int_hook(socket_connect, sock, address, addrlen); in security_socket_connect() 5169 struct sockaddr *address, int addrlen) in security_sctp_bind_connect() argument 5171 return call_int_hook(sctp_bind_connect, sk, optname, address, addrlen); in security_sctp_bind_connect()
|
| /security/selinux/ |
| A D | hooks.c | 4893 family_sa = address->sa_family; in selinux_socket_bind() 4899 addr4 = (struct sockaddr_in *)address; in selinux_socket_bind() 4921 addr6 = (struct sockaddr_in6 *)address; in selinux_socket_bind() 4998 struct sockaddr *address, int addrlen) in selinux_socket_connect_helper() argument 5013 if (address->sa_family == AF_UNSPEC) in selinux_socket_connect_helper() 5034 switch (address->sa_family) { in selinux_socket_connect_helper() 5036 addr4 = (struct sockaddr_in *)address; in selinux_socket_connect_helper() 5042 addr6 = (struct sockaddr_in6 *)address; in selinux_socket_connect_helper() 5073 ad.u.net->family = address->sa_family; in selinux_socket_connect_helper() 5568 struct sockaddr *address, in selinux_sctp_bind_connect() argument [all …]
|
| /security/apparmor/ |
| A D | lsm.c | 1366 struct sockaddr *address, int addrlen) in apparmor_socket_bind() argument 1370 AA_BUG(!address); in apparmor_socket_bind() 1374 return aa_unix_bind_perm(sock, address, addrlen); in apparmor_socket_bind() 1379 struct sockaddr *address, int addrlen) in apparmor_socket_connect() argument 1383 AA_BUG(!address); in apparmor_socket_connect()
|