Home
last modified time | relevance | path

Searched refs:u (Results 1 – 24 of 24) sorted by relevance

/security/
A Dlsm_audit.c60 ad->u.net->dport = th->dest; in ipv4_skb_to_auditdata()
67 ad->u.net->dport = uh->dest; in ipv4_skb_to_auditdata()
74 ad->u.net->dport = sh->dest; in ipv4_skb_to_auditdata()
258 inode = a->u.inode; in audit_log_lsm_data()
286 if (a->u.net->sk) { in audit_log_lsm_data()
319 u = unix_sk(sk); in audit_log_lsm_data()
323 if (u->path.dentry) { in audit_log_lsm_data()
341 a->u.net->sport, in audit_log_lsm_data()
344 a->u.net->dport, in audit_log_lsm_data()
349 a->u.net->sport, in audit_log_lsm_data()
[all …]
/security/keys/trusted-keys/
A Dtrusted_tee.c85 param[0].u.memref.shm = reg_shm; in trusted_tee_seal()
86 param[0].u.memref.size = p->key_len; in trusted_tee_seal()
87 param[0].u.memref.shm_offs = 0; in trusted_tee_seal()
89 param[1].u.memref.shm = reg_shm; in trusted_tee_seal()
132 param[0].u.memref.shm = reg_shm; in trusted_tee_unseal()
136 param[1].u.memref.shm = reg_shm; in trusted_tee_unseal()
138 param[1].u.memref.shm_offs = 0; in trusted_tee_unseal()
178 param[0].u.memref.shm = reg_shm; in trusted_tee_get_random()
179 param[0].u.memref.size = key_len; in trusted_tee_get_random()
180 param[0].u.memref.shm_offs = 0; in trusted_tee_get_random()
[all …]
/security/selinux/ss/
A Davtab.c85 *xperms = *(datum->u.xperms); in avtab_insert_node()
86 newnode->datum.u.xperms = xperms; in avtab_insert_node()
88 newnode->datum.u.data = datum->u.data; in avtab_insert_node()
234 temp->datum.u.xperms); in avtab_destroy()
413 datum.u.data = le32_to_cpu(buf32[items++]); in avtab_read_item()
487 datum.u.xperms = &xperms; in avtab_read_item()
494 datum.u.data = le32_to_cpu(*buf32); in avtab_read_item()
497 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item()
556 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item()
579 ARRAY_SIZE(cur->datum.u.xperms->perms.p), fp); in avtab_write_item()
[all …]
A Dpolicydb.c380 kfree(c->u.name); in ocontext_destroy()
2217 if (!strcmp(newc->u.name, c->u.name) && in genfs_read()
2224 len = strlen(newc->u.name); in genfs_read()
2225 len2 = strlen(c->u.name); in genfs_read()
2303 c->u.name); in ocontext_read()
2384 c->u.ibpkey.subnet_prefix = in ocontext_read()
3340 len = strlen(c->u.name); in ocontext_write()
3378 len = strlen(c->u.name); in ocontext_write()
3393 c->u.node6.addr in ocontext_write()
3397 c->u.node6.mask in ocontext_write()
[all …]
A Dservices.c605 node->datum.u.xperms->driver); in services_compute_xperms_drivers()
611 node->datum.u.xperms->driver); in services_compute_xperms_drivers()
999 node->datum.u.xperms->specified); in services_compute_xperms_decision()
1008 &node->datum.u.xperms->perms, in services_compute_xperms_decision()
1013 &node->datum.u.xperms->perms, in services_compute_xperms_decision()
2469 c->u.port.low_port <= port && in security_port_sid()
2470 c->u.port.high_port >= port) in security_port_sid()
2630 if (strcmp(c->u.name, name) == 0) in security_netif_sid()
2705 if (c->u.node.addr == (addr & c->u.node.mask)) in security_node_sid()
2719 c->u.node6.mask)) in security_node_sid()
[all …]
A Davtab.h75 } u; member
A Dconditional.c582 avd->allowed |= node->datum.u.data; in cond_compute_av()
590 avd->auditdeny &= node->datum.u.data; in cond_compute_av()
593 avd->auditallow |= node->datum.u.data; in cond_compute_av()
A Dpolicydb.h196 } u; member
/security/apparmor/
A Dnet.c100 const struct unix_sock *u = unix_sk(sk); in audit_unix_sk_addr() local
102 if (u && u->addr) { in audit_unix_sk_addr()
104 struct sockaddr_un *addr = aa_sunaddr(u, &addrlen); in audit_unix_sk_addr()
119 if (address_family_names[ad->common.u.net->family]) in audit_net_cb()
121 address_family_names[ad->common.u.net->family]); in audit_net_cb()
124 ad->common.u.net->family); in audit_net_cb()
144 if (ad->common.u.net->family == PF_UNIX) { in audit_net_cb()
145 if (ad->net.addr || !ad->common.u.net->sk) in audit_net_cb()
150 audit_unix_sk_addr(ab, "addr", ad->common.u.net->sk); in audit_net_cb()
A Daf_unix.c28 static inline struct sock *aa_unix_sk(struct unix_sock *u) in aa_unix_sk() argument
30 return &u->sk; in aa_unix_sk()
113 addr = smp_load_acquire(&u->addr); in aa_sunaddr()
124 struct unix_sock *u, struct aa_perms **p, in match_to_sk() argument
128 struct sockaddr_un *addr = aa_sunaddr(u, &addrlen); in match_to_sk()
131 u->sk.sk_protocol, addr, addrlen, p, info); in match_to_sk()
139 u32 request, struct unix_sock *u, in match_to_cmd() argument
145 state = match_to_sk(policy, state, request, u, p, info); in match_to_cmd()
156 u32 request, struct unix_sock *u, in match_to_peer() argument
629 struct unix_sock *u = unix_sk(sk); in aa_unix_peer_perm() local
[all …]
A Daudit.c197 ad->common.u.tsk ? ad->common.u.tsk : current); in aa_audit()
A Dcapability.c52 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb()
187 ad.common.u.cap = cap; in aa_capable()
A Dlabel.c203 long u = FLAG_UNCONFINED; in accum_label_info() local
213 u |= new->vec[i]->label.flags & (FLAG_DEBUG1 | FLAG_DEBUG2 | in accum_label_info()
215 if (!(u & new->vec[i]->label.flags & FLAG_UNCONFINED)) in accum_label_info()
216 u &= ~FLAG_UNCONFINED; in accum_label_info()
219 new->flags |= u; in accum_label_info()
A Dfile.c112 ad.common.u.tsk = NULL; in aa_audit_file()
/security/landlock/
A Dtask.c115 .u.tsk = child, in hook_ptrace_access_check()
161 .u.tsk = current, in hook_ptrace_traceme()
288 .u.net = &(struct lsm_network_audit) { in hook_unix_stream_connect()
325 .u.net = &(struct lsm_network_audit) { in hook_unix_may_send()
383 .u.tsk = p, in hook_task_kill()
424 .u.tsk = tsk, in hook_file_send_sigiotask()
A Dfs.c933 log_request_parent1->audit.u.path = *path; in is_access_to_paths_allowed()
943 log_request_parent2->audit.u.path = *path; in is_access_to_paths_allowed()
1226 request1.audit.u.path.dentry = old_parent; in current_check_refer_path()
1230 request2.audit.u.path.dentry = new_dir->dentry; in current_check_refer_path()
1384 .u.path = *path, in log_fs_change_topology_path()
1398 .u.dentry = dentry, in log_fs_change_topology_dentry()
1710 .u.file = file, in hook_file_truncate()
1746 .u.op = &(struct lsm_ioctlop_audit) { in hook_file_ioctl_common()
A Dnet.c190 .audit.u.net = &audit_net, in current_check_access_socket()
/security/smack/
A Dsmack.h467 a->a.u.net = net; in smk_ad_init_net()
473 a->a.u.tsk = t; in smk_ad_setfield_u_tsk()
478 a->a.u.dentry = d; in smk_ad_setfield_u_fs_path_dentry()
483 a->a.u.inode = i; in smk_ad_setfield_u_fs_inode()
488 a->a.u.path = p; in smk_ad_setfield_u_fs_path()
493 a->a.u.net->sk = sk; in smk_ad_setfield_u_net_sk()
A Dsmack_lsm.c2689 ad.a.u.net->family = PF_INET6; in smk_ipv6_check()
3139 ad.a.u.ipc_id = isp->id; in smk_curacc_shm()
3228 ad.a.u.ipc_id = isp->id; in smk_curacc_sem()
3323 ad.a.u.ipc_id = isp->id; in smk_curacc_msq()
3431 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
4192 ad.a.u.net->family = family; in smack_socket_sock_rcv_skb()
4193 ad.a.u.net->netif = skb->skb_iif; in smack_socket_sock_rcv_skb()
4225 ad.a.u.net->family = family; in smack_socket_sock_rcv_skb()
4226 ad.a.u.net->netif = skb->skb_iif; in smack_socket_sock_rcv_skb()
4398 ad.a.u.net->family = family; in smack_inet_conn_request()
[all …]
/security/selinux/
A Dhooks.c237 ad->u.net = net; in __ad_net_init()
1640 ad.u.cap = cap; in cred_has_capability()
1715 ad.u.path = *path; in path_has_perm()
1730 ad.u.file = file; in file_path_has_perm()
1757 ad.u.file = file; in file_has_perm()
3516 ad.u.path = *path; in selinux_path_notify()
3819 ad.u.op = &ioctl; in ioctl_has_perm()
4255 ad.u.file = file; in selinux_kernel_load_from_file()
4930 ad.u.net = &net; in selinux_socket_bind()
5071 ad.u.net = &net; in selinux_socket_connect_helper()
[all …]
/security/apparmor/include/
A Daf_unix.h34 struct sockaddr_un *aa_sunaddr(const struct unix_sock *u, int *addrlen);
A Daudit.h180 .common.u.tsk = NULL, \
A Dnet.h68 NAME.common.u.net = &(NAME ## _net); \
/security/tomoyo/
A Dnetwork.c597 struct tomoyo_unix_addr_info *u = &address->unix0; in tomoyo_check_unix_address() local
603 u->addr = ((struct sockaddr_un *) addr)->sun_path; in tomoyo_check_unix_address()
604 u->addr_len = addr_len; in tomoyo_check_unix_address()

Completed in 69 milliseconds