• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/

Lines Matching defs:sksec

3654 	struct sk_security_struct *sksec = sk->sk_security;
3658 if (sksec->sid == SECINITSID_KERNEL)
3664 return avc_has_perm(tsid, sksec->sid, sksec->sclass, perms, &ad);
3687 struct sk_security_struct *sksec;
3699 sksec = sock->sk->sk_security;
3700 sksec->sid = isec->sid;
3701 sksec->sclass = isec->sclass;
3730 struct sk_security_struct *sksec = sk->sk_security;
3760 err = avc_has_perm(sksec->sid, sid,
3761 sksec->sclass,
3768 switch (sksec->sclass) {
3799 err = avc_has_perm(sksec->sid, sid,
3800 sksec->sclass, node_perm, &ad);
3811 struct sk_security_struct *sksec = sk->sk_security;
3821 if (sksec->sclass == SECCLASS_TCP_SOCKET ||
3822 sksec->sclass == SECCLASS_DCCP_SOCKET) {
3845 perm = (sksec->sclass == SECCLASS_TCP_SOCKET) ?
3851 err = avc_has_perm(sksec->sid, sid, sksec->sclass, perm, &ad);
4004 struct sk_security_struct *sksec = sk->sk_security;
4006 u32 sk_sid = sksec->sid;
4033 err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad);
4036 err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad);
4045 struct sk_security_struct *sksec = sk->sk_security;
4047 u32 sk_sid = sksec->sid;
4113 struct sk_security_struct *sksec = sock->sk->sk_security;
4116 if (sksec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
4117 sksec->sclass == SECCLASS_TCP_SOCKET)
4118 peer_sid = sksec->peer_sid;
4169 struct sk_security_struct *sksec;
4171 sksec = kzalloc(sizeof(*sksec), priority);
4172 if (!sksec)
4175 sksec->peer_sid = SECINITSID_UNLABELED;
4176 sksec->sid = SECINITSID_UNLABELED;
4177 selinux_netlbl_sk_security_reset(sksec);
4178 sk->sk_security = sksec;
4185 struct sk_security_struct *sksec = sk->sk_security;
4188 selinux_netlbl_sk_security_free(sksec);
4189 kfree(sksec);
4194 struct sk_security_struct *sksec = sk->sk_security;
4197 newsksec->sid = sksec->sid;
4198 newsksec->peer_sid = sksec->peer_sid;
4199 newsksec->sclass = sksec->sclass;
4209 struct sk_security_struct *sksec = sk->sk_security;
4211 *secid = sksec->sid;
4218 struct sk_security_struct *sksec = sk->sk_security;
4222 isec->sid = sksec->sid;
4223 sksec->sclass = isec->sclass;
4229 struct sk_security_struct *sksec = sk->sk_security;
4243 req->secid = sksec->sid;
4246 err = security_sid_mls_copy(sksec->sid, peersid, &newsid);
4276 struct sk_security_struct *sksec = sk->sk_security;
4282 selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid);
4308 struct sk_security_struct *sksec = sk->sk_security;
4320 sksec->sid = current_sid();
4321 sksec->sclass = SECCLASS_TUN_SOCKET;
4326 struct sk_security_struct *sksec = sk->sk_security;
4330 err = avc_has_perm(sid, sksec->sid, SECCLASS_TUN_SOCKET,
4339 sksec->sid = sid;
4349 struct sk_security_struct *sksec = sk->sk_security;
4357 err = selinux_nlmsg_lookup(sksec->sclass, nlh->nlmsg_type, &perm);
4363 nlh->nlmsg_type, sksec->sclass);
4467 struct sk_security_struct *sksec = skb->sk->sk_security;
4468 sid = sksec->sid;
4491 struct sk_security_struct *sksec;
4498 sksec = sk->sk_security;
4507 if (avc_has_perm(sksec->sid, skb->secmark,
4512 if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
4578 struct sk_security_struct *sksec = sk->sk_security;
4579 peer_sid = sksec->sid;