Searched refs:sk_sid (Results 1 - 4 of 4) sorted by relevance

/security/selinux/include/
H A Dxfrm.h38 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
40 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
62 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument
68 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
/security/selinux/
H A Dxfrm.c404 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, argument
426 return avc_has_perm(sk_sid, peer_sid,
437 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, argument
469 return avc_has_perm(sk_sid, SECINITSID_UNLABELED,
H A Dhooks.c4018 * @sk_sid: the parent socket's SID
4022 * If @skb_sid is valid then the user:role:type information from @sk_sid is
4025 * of @sk_sid. Returns zero on success, negative values on failure.
4028 static int selinux_conn_sid(u32 sk_sid, u32 skb_sid, u32 *conn_sid) argument
4033 err = security_sid_mls_copy(sk_sid, skb_sid, conn_sid);
4035 *conn_sid = sk_sid;
4426 u32 sk_sid = sksec->sid; local
4440 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET,
4459 u32 sk_sid = sksec->sid; local
4505 err = avc_has_perm(sk_sid, peer_si
[all...]
/security/
H A Dcapability.c828 static int cap_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 sk_sid, u8 dir) argument

Completed in 100 milliseconds