Lines Matching refs:skb

4501  * @skb: netlink message

4511 int security_netlink_send(struct sock *sk, struct sk_buff *skb)
4513 return call_int_hook(netlink_send, sk, skb);
4800 * @skb: incoming packet
4804 * sk_buff @skb has been associated with a particular socket, @sk. Must not
4809 int security_sock_rcv_skb(struct sock *sk, struct sk_buff *skb)
4811 return call_int_hook(socket_sock_rcv_skb, sk, skb);
4840 * @skb: datagram packet
4852 struct sk_buff *skb, u32 *secid)
4854 return call_int_hook(socket_getpeersec_dgram, sock, skb, secid);
4965 * @skb: incoming connection
4968 * Initialize the @req LSM state based on @sk and the incoming connect in @skb.
4973 struct sk_buff *skb, struct request_sock *req)
4975 return call_int_hook(inet_conn_request, sk, skb, req);
4995 * @skb: connection packet
4997 * Update @sock's LSM state to represent a new connection from @skb.
5000 struct sk_buff *skb)
5002 call_void_hook(inet_conn_established, sk, skb);
5141 * @skb: packet requesting the association
5143 * Passes the @asoc and @chunk->skb of the association INIT packet to the LSM.
5148 struct sk_buff *skb)
5150 return call_int_hook(sctp_assoc_request, asoc, skb);
5195 * @skb: packet establishing the association
5197 * Passes the @asoc and @chunk->skb of the association COOKIE_ACK packet to the
5203 struct sk_buff *skb)
5205 return call_int_hook(sctp_assoc_established, asoc, skb);
5474 * @skb: xfrm packet
5477 * Decode the packet in @skb and return the security label in @secid.
5481 int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
5483 return call_int_hook(xfrm_decode_session, skb, secid, 1);
5486 void security_skb_classify_flow(struct sk_buff *skb, struct flowi_common *flic)
5488 int rc = call_int_hook(xfrm_decode_session, skb, &flic->flowic_secid,