Searched refs:sk_sid (Results 1 - 6 of 6) sorted by relevance
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | xfrm.h | 39 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, 41 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, 61 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument 67 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | xfrm.h | 41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, 43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, 63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument 69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | xfrm.c | 405 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument 428 sk_sid, peer_sid, in selinux_xfrm_sock_rcv_skb() 439 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument 471 return avc_has_perm(&selinux_state, sk_sid, SECINITSID_UNLABELED, in selinux_xfrm_postroute_last()
|
H A D | hooks.c | 4488 * @sk_sid: the parent socket's SID 4492 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4495 * of @sk_sid. Returns zero on success, negative values on failure. 4498 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument 4503 err = security_sid_mls_copy(&selinux_state, sk_sid, skb_sid, in selinux_conn_sid() 4506 *conn_sid = sk_sid; in selinux_conn_sid() 5015 u32 sk_sid = sksec->sid; in selinux_sock_rcv_skb_compat() local 5030 sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat() 5049 u32 sk_sid = sksec->sid; in selinux_socket_sock_rcv_skb() local 5096 sk_sid, peer_si in selinux_socket_sock_rcv_skb() [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | xfrm.c | 402 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument 424 return avc_has_perm(sk_sid, peer_sid, in selinux_xfrm_sock_rcv_skb() 435 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument 467 return avc_has_perm(sk_sid, SECINITSID_UNLABELED, in selinux_xfrm_postroute_last()
|
H A D | hooks.c | 4532 * @sk_sid: the parent socket's SID 4536 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4539 * of @sk_sid. Returns zero on success, negative values on failure. 4542 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument 4547 err = security_sid_mls_copy(sk_sid, skb_sid, in selinux_conn_sid() 4550 *conn_sid = sk_sid; in selinux_conn_sid() 5044 u32 sk_sid = sksec->sid; in selinux_sock_rcv_skb_compat() local 5055 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat() 5074 u32 sk_sid = sksec->sid; in selinux_socket_sock_rcv_skb() local 5115 err = avc_has_perm(sk_sid, peer_si in selinux_socket_sock_rcv_skb() [all...] |
Completed in 17 milliseconds