Searched refs:sk_sid (Results 1 - 3 of 3) sorted by relevance
/linux-master/security/selinux/include/ |
H A D | xfrm.h | 41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, 43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, 63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument 69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
|
/linux-master/security/selinux/ |
H A D | xfrm.c | 402 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument 424 return avc_has_perm(sk_sid, peer_sid, 435 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument 467 return avc_has_perm(sk_sid, SECINITSID_UNLABELED,
|
H A D | hooks.c | 4547 * @sk_sid: the parent socket's SID 4551 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4554 * of @sk_sid. Returns zero on success, negative values on failure. 4557 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) argument 4562 err = security_sid_mls_copy(sk_sid, skb_sid, 4565 *conn_sid = sk_sid; 5074 u32 sk_sid = sksec->sid; local 5085 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, 5104 u32 sk_sid = sksec->sid; local 5145 err = avc_has_perm(sk_sid, peer_si [all...] |
Completed in 206 milliseconds