Home
last modified time | relevance | path

Searched refs:sk_sid (Results 1 - 6 of 6) sorted by relevance

/kernel/linux/linux-5.10/security/selinux/include/
H A Dxfrm.h39 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
41 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
61 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument
67 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
/kernel/linux/linux-6.6/security/selinux/include/
H A Dxfrm.h41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument
69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
/kernel/linux/linux-5.10/security/selinux/
H A Dxfrm.c405 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument
428 sk_sid, peer_sid, in selinux_xfrm_sock_rcv_skb()
439 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
471 return avc_has_perm(&selinux_state, sk_sid, SECINITSID_UNLABELED, in selinux_xfrm_postroute_last()
H A Dhooks.c4488 * @sk_sid: the parent socket's SID
4492 * If @skb_sid is valid then the user:role:type information from @sk_sid is
4495 * of @sk_sid. Returns zero on success, negative values on failure.
4498 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument
4503 err = security_sid_mls_copy(&selinux_state, sk_sid, skb_sid, in selinux_conn_sid()
4506 *conn_sid = sk_sid; in selinux_conn_sid()
5015 u32 sk_sid = sksec->sid; in selinux_sock_rcv_skb_compat() local
5030 sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat()
5049 u32 sk_sid = sksec->sid; in selinux_socket_sock_rcv_skb() local
5096 sk_sid, peer_si in selinux_socket_sock_rcv_skb()
[all...]
/kernel/linux/linux-6.6/security/selinux/
H A Dxfrm.c402 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument
424 return avc_has_perm(sk_sid, peer_sid, in selinux_xfrm_sock_rcv_skb()
435 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
467 return avc_has_perm(sk_sid, SECINITSID_UNLABELED, in selinux_xfrm_postroute_last()
H A Dhooks.c4532 * @sk_sid: the parent socket's SID
4536 * If @skb_sid is valid then the user:role:type information from @sk_sid is
4539 * of @sk_sid. Returns zero on success, negative values on failure.
4542 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument
4547 err = security_sid_mls_copy(sk_sid, skb_sid, in selinux_conn_sid()
4550 *conn_sid = sk_sid; in selinux_conn_sid()
5044 u32 sk_sid = sksec->sid; in selinux_sock_rcv_skb_compat() local
5055 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat()
5074 u32 sk_sid = sksec->sid; in selinux_socket_sock_rcv_skb() local
5115 err = avc_has_perm(sk_sid, peer_si in selinux_socket_sock_rcv_skb()
[all...]

Completed in 17 milliseconds