Searched refs:skb_sid (Results 1 - 2 of 2) sorted by relevance
/kernel/linux/linux-5.10/security/selinux/ |
H A D | hooks.c | 4489 * @skb_sid: the packet's SID 4492 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4493 * combined with the MLS information from @skb_sid in order to create 4494 * @conn_sid. If @skb_sid is not valid then @conn_sid is simply a copy 4498 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument 4502 if (skb_sid != SECSID_NULL) in selinux_conn_sid() 4503 err = security_sid_mls_copy(&selinux_state, sk_sid, skb_sid, in selinux_conn_sid() 5810 u32 skb_sid; in selinux_ip_postroute() local 5814 if (selinux_skb_peerlbl_sid(skb, family, &skb_sid)) in selinux_ip_postroute() 5822 if (skb_sid in selinux_ip_postroute() [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | hooks.c | 4533 * @skb_sid: the packet's SID 4536 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4537 * combined with the MLS information from @skb_sid in order to create 4538 * @conn_sid. If @skb_sid is not valid then @conn_sid is simply a copy 4542 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) in selinux_conn_sid() argument 4546 if (skb_sid != SECSID_NULL) in selinux_conn_sid() 4547 err = security_sid_mls_copy(sk_sid, skb_sid, in selinux_conn_sid() 5837 u32 skb_sid; in selinux_ip_postroute() local 5841 if (selinux_skb_peerlbl_sid(skb, family, &skb_sid)) in selinux_ip_postroute() 5849 if (skb_sid in selinux_ip_postroute() [all...] |
Completed in 19 milliseconds