Searched refs:sk_sid (Results 1 - 3 of 3) sorted by relevance

/linux-master/security/selinux/include/
H A Dxfrm.h41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument
69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
/linux-master/security/selinux/
H A Dxfrm.c402 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument
424 return avc_has_perm(sk_sid, peer_sid,
435 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
467 return avc_has_perm(sk_sid, SECINITSID_UNLABELED,
H A Dhooks.c4547 * @sk_sid: the parent socket's SID
4551 * If @skb_sid is valid then the user:role:type information from @sk_sid is
4554 * of @sk_sid. Returns zero on success, negative values on failure.
4557 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) argument
4562 err = security_sid_mls_copy(sk_sid, skb_sid,
4565 *conn_sid = sk_sid;
5074 u32 sk_sid = sksec->sid; local
5085 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET,
5104 u32 sk_sid = sksec->sid; local
5145 err = avc_has_perm(sk_sid, peer_si
[all...]

Completed in 206 milliseconds