| /security/ |
| A D | lsm_audit.c | 60 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata() 67 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata() 74 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata() 121 ad->u.net->dport = th->dest; in ipv6_skb_to_auditdata() 132 ad->u.net->dport = uh->dest; in ipv6_skb_to_auditdata() 286 if (a->u.net->sk) { in audit_log_lsm_data() 341 a->u.net->sport, in audit_log_lsm_data() 344 a->u.net->dport, in audit_log_lsm_data() 349 a->u.net->sport, in audit_log_lsm_data() 352 a->u.net->dport, in audit_log_lsm_data() [all …]
|
| A D | Kconfig.hardening | 114 * https://grsecurity.net/ 115 * https://pax.grsecurity.net/ 343 * https://grsecurity.net/ 344 * https://pax.grsecurity.net/
|
| A D | Kconfig | 165 See <http://tboot.sourceforge.net> for more information about tboot.
|
| /security/smack/ |
| A D | smack_netfilter.c | 55 static int __net_init smack_nf_register(struct net *net) in smack_nf_register() argument 57 return nf_register_net_hooks(net, smack_nf_ops, in smack_nf_register() 61 static void __net_exit smack_nf_unregister(struct net *net) in smack_nf_unregister() argument 63 nf_unregister_net_hooks(net, smack_nf_ops, ARRAY_SIZE(smack_nf_ops)); in smack_nf_unregister()
|
| A D | smack.h | 463 char type, struct lsm_network_audit *net) in smk_ad_init_net() argument 466 memset(net, 0, sizeof(*net)); in smk_ad_init_net() 467 a->a.u.net = net; in smk_ad_init_net() 493 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
|
| A D | smack_lsm.c | 2646 struct lsm_network_audit net; in smk_ipv4_check() local 2682 struct lsm_network_audit net; in smk_ipv6_check() local 2689 ad.a.u.net->family = PF_INET6; in smk_ipv6_check() 3846 struct lsm_network_audit net; in smack_unix_stream_connect() local 3900 struct lsm_network_audit net; in smack_unix_may_send() local 4166 struct lsm_network_audit net; in smack_socket_sock_rcv_skb() local 4192 ad.a.u.net->family = family; in smack_socket_sock_rcv_skb() 4225 ad.a.u.net->family = family; in smack_socket_sock_rcv_skb() 4367 struct lsm_network_audit net; in smack_inet_conn_request() local 4398 ad.a.u.net->family = family; in smack_inet_conn_request() [all …]
|
| /security/apparmor/ |
| A D | net.c | 119 if (address_family_names[ad->common.u.net->family]) in audit_net_cb() 124 ad->common.u.net->family); in audit_net_cb() 125 if (sock_type_names[ad->net.type]) in audit_net_cb() 127 sock_type_names[ad->net.type]); in audit_net_cb() 130 ad->net.type); in audit_net_cb() 144 if (ad->common.u.net->family == PF_UNIX) { in audit_net_cb() 145 if (ad->net.addr || !ad->common.u.net->sk) in audit_net_cb() 147 unix_addr(ad->net.addr), in audit_net_cb() 148 ad->net.addrlen); in audit_net_cb() 153 unix_addr(ad->net.peer.addr), in audit_net_cb() [all …]
|
| A D | Makefile | 8 resource.o secid.o file.o policy_ns.o label.o mount.o net.o \ 102 $(obj)/net.o : $(obj)/net_names.h 111 $(srctree)/include/linux/net.h \
|
| A D | af_unix.c | 268 if (is_unix_addr_fs(ad->net.addr, ad->net.addrlen)) in profile_bind_perm() 274 unix_addr(ad->net.addr), in profile_bind_perm() 275 ad->net.addrlen, in profile_bind_perm() 503 ad.net.addr = unix_addr(addr); in aa_unix_bind_perm() 504 ad.net.addrlen = addrlen; in aa_unix_bind_perm() 609 ad.net.peer.addr = peer_addr; in unix_peer_perm() 610 ad.net.peer.addrlen = peer_addrlen; in unix_peer_perm()
|
| A D | lsm.c | 2399 static int __net_init apparmor_nf_register(struct net *net) in apparmor_nf_register() argument 2401 return nf_register_net_hooks(net, apparmor_nf_ops, in apparmor_nf_register() 2405 static void __net_exit apparmor_nf_unregister(struct net *net) in apparmor_nf_unregister() argument 2407 nf_unregister_net_hooks(net, apparmor_nf_ops, in apparmor_nf_unregister()
|
| /security/selinux/include/ |
| A D | xfrm.h | 50 struct net *net; in selinux_xfrm_notify_policyload() local 53 for_each_net(net) in selinux_xfrm_notify_policyload() 54 rt_genid_bump_all(net); in selinux_xfrm_notify_policyload()
|
| A D | netif.h | 22 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid);
|
| A D | objsec.h | 107 const struct net *ns; /* network namespace */
|
| /security/selinux/ |
| A D | netif.c | 52 static inline u32 sel_netif_hashfn(const struct net *ns, int ifindex) in sel_netif_hashfn() 67 static inline struct sel_netif *sel_netif_find(const struct net *ns, in sel_netif_find() 132 static int sel_netif_sid_slow(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid_slow() 195 int sel_netif_sid(struct net *ns, int ifindex, u32 *sid) in sel_netif_sid() 221 static void sel_netif_kill(const struct net *ns, int ifindex) in sel_netif_kill()
|
| A D | hooks.c | 237 ad->u.net = net; in __ad_net_init() 238 net->netif = ifindex; in __ad_net_init() 239 net->sk = sk; in __ad_net_init() 240 net->family = family; in __ad_net_init() 4513 ad->u.net->dport = th->dest; in selinux_parse_skb_ipv4() 4529 ad->u.net->dport = uh->dest; in selinux_parse_skb_ipv4() 4640 switch (ad->u.net->family) { in selinux_parse_skb() 4930 ad.u.net = &net; in selinux_socket_bind() 5071 ad.u.net = &net; in selinux_socket_connect_helper() 7718 static int __net_init selinux_nf_register(struct net *net) in selinux_nf_register() argument [all …]
|
| /security/apparmor/include/ |
| A D | net.h | 68 NAME.common.u.net = &(NAME ## _net); \ 70 NAME.net.type = (T); \ 71 NAME.net.protocol = (P)
|
| A D | audit.h | 147 } net; member
|
| /security/landlock/ |
| A D | ruleset.h | 267 ruleset->access_masks[layer_level].net |= net_mask; in landlock_add_net_access_mask() 294 return ruleset->access_masks[layer_level].net; in landlock_get_net_access_mask()
|
| A D | Makefile | 6 landlock-$(CONFIG_INET) += net.o
|
| A D | net.c | 56 .net = access_request, in current_check_access_socket() 190 .audit.u.net = &audit_net, in current_check_access_socket()
|
| A D | access.h | 51 access_mask_t net : LANDLOCK_NUM_ACCESS_NET; member
|
| A D | task.c | 288 .u.net = &(struct lsm_network_audit) { in hook_unix_stream_connect() 325 .u.net = &(struct lsm_network_audit) { in hook_unix_may_send()
|
| /security/tomoyo/ |
| A D | Kconfig | 13 found at <https://tomoyo.sourceforge.net/>.
|
| /security/integrity/ima/ |
| A D | Kconfig | 155 <http://linux-ima.sourceforge.net>
|