Lines Matching refs:sksec

4527 	struct sk_security_struct *sksec = sk->sk_security;
4531 if (sksec->sid == SECINITSID_KERNEL)
4539 current_sid(), sksec->sid, sksec->sclass, perms,
4568 struct sk_security_struct *sksec;
4584 sksec = sock->sk->sk_security;
4585 sksec->sclass = sclass;
4586 sksec->sid = sid;
4588 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4589 sksec->sctp_assoc_state = SCTP_ASSOC_UNSET;
4616 struct sk_security_struct *sksec = sk->sk_security;
4697 sksec->sid, sid,
4698 sksec->sclass,
4705 switch (sksec->sclass) {
4737 sksec->sid, sid,
4738 sksec->sclass, node_perm, &ad);
4746 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4758 struct sk_security_struct *sksec = sk->sk_security;
4777 if (sksec->sclass == SECCLASS_TCP_SOCKET ||
4778 sksec->sclass == SECCLASS_DCCP_SOCKET ||
4779 sksec->sclass == SECCLASS_SCTP_SOCKET) {
4809 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4819 switch (sksec->sclass) {
4836 sksec->sid, sid, sksec->sclass, perm, &ad);
5014 struct sk_security_struct *sksec = sk->sk_security;
5015 u32 sk_sid = sksec->sid;
5036 err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad);
5039 err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad);
5047 struct sk_security_struct *sksec = sk->sk_security;
5049 u32 sk_sid = sksec->sid;
5121 struct sk_security_struct *sksec = sock->sk->sk_security;
5124 if (sksec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
5125 sksec->sclass == SECCLASS_TCP_SOCKET ||
5126 sksec->sclass == SECCLASS_SCTP_SOCKET)
5127 peer_sid = sksec->peer_sid;
5181 struct sk_security_struct *sksec;
5183 sksec = kzalloc(sizeof(*sksec), priority);
5184 if (!sksec)
5187 sksec->peer_sid = SECINITSID_UNLABELED;
5188 sksec->sid = SECINITSID_UNLABELED;
5189 sksec->sclass = SECCLASS_SOCKET;
5190 selinux_netlbl_sk_security_reset(sksec);
5191 sk->sk_security = sksec;
5198 struct sk_security_struct *sksec = sk->sk_security;
5201 selinux_netlbl_sk_security_free(sksec);
5202 kfree(sksec);
5207 struct sk_security_struct *sksec = sk->sk_security;
5210 newsksec->sid = sksec->sid;
5211 newsksec->peer_sid = sksec->peer_sid;
5212 newsksec->sclass = sksec->sclass;
5222 struct sk_security_struct *sksec = sk->sk_security;
5224 *secid = sksec->sid;
5232 struct sk_security_struct *sksec = sk->sk_security;
5236 isec->sid = sksec->sid;
5237 sksec->sclass = isec->sclass;
5247 struct sk_security_struct *sksec = ep->base.sk->sk_security;
5273 if (sksec->sctp_assoc_state == SCTP_ASSOC_UNSET) {
5274 sksec->sctp_assoc_state = SCTP_ASSOC_SET;
5281 sksec->peer_sid = peer_sid;
5282 } else if (sksec->peer_sid != peer_sid) {
5290 sksec->peer_sid, peer_sid, sksec->sclass,
5302 err = selinux_conn_sid(sksec->sid, peer_sid, &conn_sid);
5398 struct sk_security_struct *sksec = sk->sk_security;
5409 newsksec->sclass = sksec->sclass;
5416 struct sk_security_struct *sksec = sk->sk_security;
5425 err = selinux_conn_sid(sksec->sid, peersid, &connsid);
5454 struct sk_security_struct *sksec = sk->sk_security;
5460 selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid);
5538 struct sk_security_struct *sksec = sk->sk_security;
5547 sksec->sid = tunsec->sid;
5548 sksec->sclass = SECCLASS_TUN_SOCKET;
5664 struct sk_security_struct *sksec;
5682 sksec = sk->sk_security;
5683 sid = sksec->sid;
5713 struct sk_security_struct *sksec;
5721 sksec = sk->sk_security;
5732 sksec->sid, skb->secmark,
5736 if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
5811 struct sk_security_struct *sksec;
5813 sksec = sk->sk_security;
5836 if (selinux_conn_sid(sksec->sid, skb_sid, &peer_sid))
5842 struct sk_security_struct *sksec = sk->sk_security;
5843 peer_sid = sksec->sid;
5907 struct sk_security_struct *sksec = sk->sk_security;
5908 u16 sclass = sksec->sclass;