Home
last modified time | relevance | path

Searched refs:skb (Results 1 – 11 of 11) sorted by relevance

/security/selinux/include/
A Dnetlabel.h29 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error,
35 int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type,
37 int selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid);
39 struct sk_buff *skb);
45 struct sk_buff *skb, u16 family,
59 static inline void selinux_netlbl_err(struct sk_buff *skb, u16 family, in selinux_netlbl_err() argument
77 static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, in selinux_netlbl_skbuff_getsid() argument
84 static inline int selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, in selinux_netlbl_skbuff_setsid() argument
92 struct sk_buff *skb) in selinux_netlbl_sctp_assoc_request() argument
115 struct sk_buff *skb, u16 family, in selinux_netlbl_sock_rcv_skb() argument
A Dxfrm.h41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
45 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
46 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument
69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument
76 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, in selinux_xfrm_decode_session() argument
87 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument
/security/selinux/
A Dnetlink.c71 struct sk_buff *skb; in selnl_notify() local
76 skb = nlmsg_new(len, GFP_USER); in selnl_notify()
77 if (!skb) in selnl_notify()
80 tmp = skb->tail; in selnl_notify()
81 nlh = nlmsg_put(skb, 0, 0, msgtype, len, 0); in selnl_notify()
85 nlh->nlmsg_len = skb->tail - tmp; in selnl_notify()
86 NETLINK_CB(skb).dst_group = SELNLGRP_AVC; in selnl_notify()
87 netlink_broadcast(selnl, skb, 0, SELNLGRP_AVC, GFP_USER); in selnl_notify()
92 kfree_skb(skb); in selnl_notify()
A Dnetlabel.c54 netlbl_cache_add(skb, family, secattr); in selinux_netlbl_sidlookup_cached()
146 netlbl_skbuff_err(skb, family, error, gateway); in selinux_netlbl_err()
209 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid()
243 sk = skb_to_full_sk(skb); in selinux_netlbl_skbuff_setsid()
259 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid()
278 struct sk_buff *skb) in selinux_netlbl_sctp_assoc_request() argument
298 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request()
300 addr4.sin_addr.s_addr = ip_hdr(skb)->saddr; in selinux_netlbl_sctp_assoc_request()
304 addr6.sin6_addr = ipv6_hdr(skb)->saddr; in selinux_netlbl_sctp_assoc_request()
438 struct sk_buff *skb, in selinux_netlbl_sock_rcv_skb() argument
[all …]
A Dxfrm.c207 static u32 selinux_xfrm_skb_sid_egress(struct sk_buff *skb) in selinux_xfrm_skb_sid_egress() argument
209 struct dst_entry *dst = skb_dst(skb); in selinux_xfrm_skb_sid_egress()
221 static int selinux_xfrm_skb_sid_ingress(struct sk_buff *skb, in selinux_xfrm_skb_sid_ingress() argument
225 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_skb_sid_ingress()
258 if (skb == NULL) { in selinux_xfrm_decode_session()
262 return selinux_xfrm_skb_sid_ingress(skb, sid, ckall); in selinux_xfrm_decode_session()
265 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument
269 rc = selinux_xfrm_skb_sid_ingress(skb, sid, 0); in selinux_xfrm_skb_sid()
271 *sid = selinux_xfrm_skb_sid_egress(skb); in selinux_xfrm_skb_sid()
403 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_sock_rcv_skb()
[all …]
A Dhooks.c5375 if (skb && skb->protocol == htons(ETH_P_IP)) in selinux_socket_getpeersec_dgram()
5377 else if (skb && skb->protocol == htons(ETH_P_IPV6)) in selinux_socket_getpeersec_dgram()
5390 } else if (skb) in selinux_socket_getpeersec_dgram()
5458 struct sk_buff *skb) in selinux_sctp_process_new_assoc() argument
5548 struct sk_buff *skb) in selinux_sctp_assoc_established() argument
5888 sk = sk_to_full_sk(skb->sk); in selinux_ip_output()
5928 sk = skb_to_full_sk(skb); in selinux_ip_postroute_compat()
5949 struct sk_buff *skb, in selinux_ip_postroute() argument
5974 sk = skb_to_full_sk(skb); in selinux_ip_postroute()
5988 if (skb_dst(skb) != NULL && skb_dst(skb)->xfrm != NULL && in selinux_ip_postroute()
[all …]
/security/
A Dlsm_audit.c39 int ipv4_skb_to_auditdata(struct sk_buff *skb, in ipv4_skb_to_auditdata() argument
45 ih = ip_hdr(skb); in ipv4_skb_to_auditdata()
57 struct tcphdr *th = tcp_hdr(skb); in ipv4_skb_to_auditdata()
64 struct udphdr *uh = udp_hdr(skb); in ipv4_skb_to_auditdata()
71 struct sctphdr *sh = sctp_hdr(skb); in ipv4_skb_to_auditdata()
91 int ipv6_skb_to_auditdata(struct sk_buff *skb, in ipv6_skb_to_auditdata() argument
99 ip6 = ipv6_hdr(skb); in ipv6_skb_to_auditdata()
104 offset = skb_network_offset(skb); in ipv6_skb_to_auditdata()
107 offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); in ipv6_skb_to_auditdata()
116 th = skb_header_pointer(skb, offset, sizeof(_tcph), &_tcph); in ipv6_skb_to_auditdata()
[all …]
A Dsecurity.c4513 return call_int_hook(netlink_send, sk, skb); in security_netlink_send()
4811 return call_int_hook(socket_sock_rcv_skb, sk, skb); in security_sock_rcv_skb()
4852 struct sk_buff *skb, u32 *secid) in security_socket_getpeersec_dgram() argument
4973 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument
4975 return call_int_hook(inet_conn_request, sk, skb, req); in security_inet_conn_request()
5000 struct sk_buff *skb) in security_inet_conn_established() argument
5002 call_void_hook(inet_conn_established, sk, skb); in security_inet_conn_established()
5148 struct sk_buff *skb) in security_sctp_assoc_request() argument
5150 return call_int_hook(sctp_assoc_request, asoc, skb); in security_sctp_assoc_request()
5203 struct sk_buff *skb) in security_sctp_assoc_established() argument
[all …]
/security/smack/
A Dsmack_netfilter.c22 struct sk_buff *skb, in smack_ip_output() argument
25 struct sock *sk = skb_to_full_sk(skb); in smack_ip_output()
32 skb->secmark = skp->smk_secid; in smack_ip_output()
A Dsmack_lsm.c4066 offset = skb_network_offset(skb); in smk_skb_to_addr_ipv6()
4105 if (skb == NULL || skb->secmark == 0) in smack_from_skb()
4129 struct sk_buff *skb) in smack_from_netlbl() argument
4183 skp = smack_from_skb(skb); in smack_socket_sock_rcv_skb()
4215 skp = smack_from_skb(skb); in smack_socket_sock_rcv_skb()
4301 if (skb != NULL) { in smack_socket_getpeersec_dgram()
4318 skp = smack_from_skb(skb); in smack_socket_getpeersec_dgram()
4334 skp = smack_from_skb(skb); in smack_socket_getpeersec_dgram()
4389 skp = smack_from_skb(skb); in smack_inet_conn_request()
4399 ad.a.u.net->netif = skb->skb_iif; in smack_inet_conn_request()
[all …]
/security/apparmor/
A Dlsm.c1510 static int apparmor_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) in apparmor_socket_sock_rcv_skb() argument
1515 if (!skb->secmark) in apparmor_socket_sock_rcv_skb()
1527 AA_MAY_RECEIVE, skb->secmark, sk); in apparmor_socket_sock_rcv_skb()
1610 struct sk_buff *skb, u32 *secid) in apparmor_socket_getpeersec_dgram() argument
1638 static int apparmor_inet_conn_request(const struct sock *sk, struct sk_buff *skb, in apparmor_inet_conn_request() argument
1644 if (!skb->secmark) in apparmor_inet_conn_request()
1649 AA_MAY_CONNECT, skb->secmark, sk); in apparmor_inet_conn_request()
2356 struct sk_buff *skb, in apparmor_ip_postroute() argument
2363 if (!skb->secmark) in apparmor_ip_postroute()
2366 sk = skb_to_full_sk(skb); in apparmor_ip_postroute()
[all …]

Completed in 65 milliseconds