/security/selinux/include/ |
H A D | netlabel.h | 49 u16 family, 53 u16 family, 56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 57 void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family); 58 int selinux_netlbl_socket_post_create(struct sock *sk, u16 family); 61 u16 family, 94 u16 family, 103 u16 family, 116 u16 family) 120 static inline void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) argument 93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument 102 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument 115 selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) argument 124 selinux_netlbl_socket_post_create(struct sock *sk, u16 family) argument 129 selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, struct sk_buff *skb, u16 family, struct common_audit_data *ad) argument [all...] |
H A D | objsec.h | 93 u16 family; /* address family */ member in struct:netnode_security_struct
|
/security/selinux/ |
H A D | netnode.c | 65 * family later */ 107 * @family: address family 114 static struct sel_netnode *sel_netnode_find(const void *addr, u16 family) argument 119 switch (family) { 132 if (node->nsec.family == family) 133 switch (family) { 160 switch (node->nsec.family) { 190 * @family 200 sel_netnode_sid_slow(void *addr, u16 family, u32 *sid) argument 263 sel_netnode_sid(void *addr, u16 family, u32 *sid) argument [all...] |
H A D | netlabel.c | 176 * @family: the socket family 191 * @family: protocol family 202 u16 family, 215 rc = netlbl_skbuff_getattr(skb, family, &secattr); 229 * @family: protocol family 238 u16 family, 263 rc = netlbl_skbuff_setattr(skb, family, secatt 201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument 237 selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid) argument 282 selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) argument 310 selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family) argument 330 selinux_netlbl_socket_post_create(struct sock *sk, u16 family) argument 369 selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, struct sk_buff *skb, u16 family, struct common_audit_data *ad) argument [all...] |
H A D | hooks.c | 1168 static inline u16 socket_type_to_security_class(int family, int type, int protocol) argument 1170 switch (family) { 3941 switch (ad->u.net->family) { 3979 * @family: protocol family 3991 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) argument 4001 err = selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); 4071 static int selinux_socket_create(int family, int type, argument 4082 secclass = socket_type_to_security_class(family, type, protocol); 4090 static int selinux_socket_post_create(struct socket *sock, int family, argument 4127 u16 family; local 4398 selinux_inet_sys_rcv_skb(struct net *ns, int ifindex, char *addrp, u16 family, u32 peer_sid, struct common_audit_data *ad) argument 4421 selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb, u16 family) argument 4458 u16 family = sk->sk_family; local 4560 u16 family; local 4583 selinux_sk_alloc_security(struct sock *sk, int family, gfp_t priority) argument 4647 u16 family = req->rsk_ops->family; local 4682 u16 family = sk->sk_family; local 4839 selinux_ip_forward(struct sk_buff *skb, const struct net_device *indev, u16 family) argument 4916 selinux_ip_output(struct sk_buff *skb, u16 family) argument 4967 selinux_ip_postroute_compat(struct sk_buff *skb, int ifindex, u16 family) argument 5000 selinux_ip_postroute(struct sk_buff *skb, const struct net_device *outdev, u16 family) argument [all...] |
/security/tomoyo/ |
H A D | network.c | 355 * @family: Name of socket family ("inet" or "unix"). 356 * @protocol: Name of protocol in @family. 363 const char *family, const u8 protocol, 366 return tomoyo_supervisor(r, "network %s %s %s %s\n", family, 615 * tomoyo_sock_family - Get socket's family. 623 u8 family; local 627 family = sk->sk_family; 628 switch (family) { 632 return family; 362 tomoyo_audit_net_log(struct tomoyo_request_info *r, const char *family, const u8 protocol, const u8 operation, const char *address) argument 648 const u8 family = tomoyo_sock_family(sock->sk); local 684 const u8 family = tomoyo_sock_family(sock->sk); local 721 const u8 family = tomoyo_sock_family(sock->sk); local 756 const u8 family = tomoyo_sock_family(sock->sk); local [all...] |
/security/ |
H A D | capability.c | 607 static int cap_socket_create(int family, int type, int protocol, int kern) argument 612 static int cap_socket_post_create(struct socket *sock, int family, int type, argument 694 static int cap_sk_alloc_security(struct sock *sk, int family, gfp_t priority) argument
|
H A D | security.c | 1167 int security_socket_create(int family, int type, int protocol, int kern) argument 1169 return security_ops->socket_create(family, type, protocol, kern); 1172 int security_socket_post_create(struct socket *sock, int family, argument 1175 return security_ops->socket_post_create(sock, family, type, 1253 int security_sk_alloc(struct sock *sk, int family, gfp_t priority) argument 1255 return security_ops->sk_alloc_security(sk, family, priority);
|
/security/smack/ |
H A D | smack_lsm.c | 2054 * @family: unused 2061 static int smack_sk_alloc_security(struct sock *sk, int family, gfp_t gfp_flags) argument 2195 ad.a.u.net->family = sap->sin_family; 2352 ad.a.u.net->family = sk->sk_family; 2432 * @family: protocol family 2441 static int smack_socket_post_create(struct socket *sock, int family, argument 2444 if (family != PF_INET || sock->sk == NULL) 3555 ad.a.u.net->family = sk->sk_family; 3633 int family local 3704 u16 family = sk->sk_family; local [all...] |