Searched refs:sk_sid (Results 1 - 4 of 4) sorted by relevance
/security/selinux/include/ |
H A D | xfrm.h | 38 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, 40 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, 62 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument 68 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
|
/security/selinux/ |
H A D | xfrm.c | 404 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument 426 return avc_has_perm(sk_sid, peer_sid, 437 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument 469 return avc_has_perm(sk_sid, SECINITSID_UNLABELED,
|
H A D | hooks.c | 4018 * @sk_sid: the parent socket's SID 4022 * If @skb_sid is valid then the user:role:type information from @sk_sid is 4025 * of @sk_sid. Returns zero on success, negative values on failure. 4028 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) argument 4033 err = security_sid_mls_copy(sk_sid, skb_sid, conn_sid); 4035 *conn_sid = sk_sid; 4426 u32 sk_sid = sksec->sid; local 4440 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, 4459 u32 sk_sid = sksec->sid; local 4505 err = avc_has_perm(sk_sid, peer_si [all...] |
/security/ |
H A D | capability.c | 828 static int cap_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 sk_sid, u8 dir) argument
|
Completed in 100 milliseconds