| /security/selinux/include/ |
| A D | netlabel.h | 29 void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error, 35 int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, 37 int selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, u32 sid); 39 struct sk_buff *skb); 45 struct sk_buff *skb, u16 family, 59 static inline void selinux_netlbl_err(struct sk_buff *skb, u16 family, in selinux_netlbl_err() argument 77 static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, in selinux_netlbl_skbuff_getsid() argument 84 static inline int selinux_netlbl_skbuff_setsid(struct sk_buff *skb, u16 family, in selinux_netlbl_skbuff_setsid() argument 92 struct sk_buff *skb) in selinux_netlbl_sctp_assoc_request() argument 115 struct sk_buff *skb, u16 family, in selinux_netlbl_sock_rcv_skb() argument
|
| A D | xfrm.h | 41 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, 43 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, 45 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall); 46 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid); 63 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_sock_rcv_skb() argument 69 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, in selinux_xfrm_postroute_last() argument 76 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, in selinux_xfrm_decode_session() argument 87 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument
|
| /security/selinux/ |
| A D | netlink.c | 71 struct sk_buff *skb; in selnl_notify() local 76 skb = nlmsg_new(len, GFP_USER); in selnl_notify() 77 if (!skb) in selnl_notify() 80 tmp = skb->tail; in selnl_notify() 81 nlh = nlmsg_put(skb, 0, 0, msgtype, len, 0); in selnl_notify() 85 nlh->nlmsg_len = skb->tail - tmp; in selnl_notify() 86 NETLINK_CB(skb).dst_group = SELNLGRP_AVC; in selnl_notify() 87 netlink_broadcast(selnl, skb, 0, SELNLGRP_AVC, GFP_USER); in selnl_notify() 92 kfree_skb(skb); in selnl_notify()
|
| A D | netlabel.c | 54 netlbl_cache_add(skb, family, secattr); in selinux_netlbl_sidlookup_cached() 146 netlbl_skbuff_err(skb, family, error, gateway); in selinux_netlbl_err() 209 rc = netlbl_skbuff_getattr(skb, family, &secattr); in selinux_netlbl_skbuff_getsid() 243 sk = skb_to_full_sk(skb); in selinux_netlbl_skbuff_setsid() 259 rc = netlbl_skbuff_setattr(skb, family, secattr); in selinux_netlbl_skbuff_setsid() 278 struct sk_buff *skb) in selinux_netlbl_sctp_assoc_request() argument 298 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request() 300 addr4.sin_addr.s_addr = ip_hdr(skb)->saddr; in selinux_netlbl_sctp_assoc_request() 304 addr6.sin6_addr = ipv6_hdr(skb)->saddr; in selinux_netlbl_sctp_assoc_request() 438 struct sk_buff *skb, in selinux_netlbl_sock_rcv_skb() argument [all …]
|
| A D | xfrm.c | 207 static u32 selinux_xfrm_skb_sid_egress(struct sk_buff *skb) in selinux_xfrm_skb_sid_egress() argument 209 struct dst_entry *dst = skb_dst(skb); in selinux_xfrm_skb_sid_egress() 221 static int selinux_xfrm_skb_sid_ingress(struct sk_buff *skb, in selinux_xfrm_skb_sid_ingress() argument 225 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_skb_sid_ingress() 258 if (skb == NULL) { in selinux_xfrm_decode_session() 262 return selinux_xfrm_skb_sid_ingress(skb, sid, ckall); in selinux_xfrm_decode_session() 265 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid) in selinux_xfrm_skb_sid() argument 269 rc = selinux_xfrm_skb_sid_ingress(skb, sid, 0); in selinux_xfrm_skb_sid() 271 *sid = selinux_xfrm_skb_sid_egress(skb); in selinux_xfrm_skb_sid() 403 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_sock_rcv_skb() [all …]
|
| A D | hooks.c | 5375 if (skb && skb->protocol == htons(ETH_P_IP)) in selinux_socket_getpeersec_dgram() 5377 else if (skb && skb->protocol == htons(ETH_P_IPV6)) in selinux_socket_getpeersec_dgram() 5390 } else if (skb) in selinux_socket_getpeersec_dgram() 5458 struct sk_buff *skb) in selinux_sctp_process_new_assoc() argument 5548 struct sk_buff *skb) in selinux_sctp_assoc_established() argument 5888 sk = sk_to_full_sk(skb->sk); in selinux_ip_output() 5928 sk = skb_to_full_sk(skb); in selinux_ip_postroute_compat() 5949 struct sk_buff *skb, in selinux_ip_postroute() argument 5974 sk = skb_to_full_sk(skb); in selinux_ip_postroute() 5988 if (skb_dst(skb) != NULL && skb_dst(skb)->xfrm != NULL && in selinux_ip_postroute() [all …]
|
| /security/ |
| A D | lsm_audit.c | 39 int ipv4_skb_to_auditdata(struct sk_buff *skb, in ipv4_skb_to_auditdata() argument 45 ih = ip_hdr(skb); in ipv4_skb_to_auditdata() 57 struct tcphdr *th = tcp_hdr(skb); in ipv4_skb_to_auditdata() 64 struct udphdr *uh = udp_hdr(skb); in ipv4_skb_to_auditdata() 71 struct sctphdr *sh = sctp_hdr(skb); in ipv4_skb_to_auditdata() 91 int ipv6_skb_to_auditdata(struct sk_buff *skb, in ipv6_skb_to_auditdata() argument 99 ip6 = ipv6_hdr(skb); in ipv6_skb_to_auditdata() 104 offset = skb_network_offset(skb); in ipv6_skb_to_auditdata() 107 offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); in ipv6_skb_to_auditdata() 116 th = skb_header_pointer(skb, offset, sizeof(_tcph), &_tcph); in ipv6_skb_to_auditdata() [all …]
|
| A D | security.c | 4513 return call_int_hook(netlink_send, sk, skb); in security_netlink_send() 4811 return call_int_hook(socket_sock_rcv_skb, sk, skb); in security_sock_rcv_skb() 4852 struct sk_buff *skb, u32 *secid) in security_socket_getpeersec_dgram() argument 4973 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument 4975 return call_int_hook(inet_conn_request, sk, skb, req); in security_inet_conn_request() 5000 struct sk_buff *skb) in security_inet_conn_established() argument 5002 call_void_hook(inet_conn_established, sk, skb); in security_inet_conn_established() 5148 struct sk_buff *skb) in security_sctp_assoc_request() argument 5150 return call_int_hook(sctp_assoc_request, asoc, skb); in security_sctp_assoc_request() 5203 struct sk_buff *skb) in security_sctp_assoc_established() argument [all …]
|
| /security/smack/ |
| A D | smack_netfilter.c | 22 struct sk_buff *skb, in smack_ip_output() argument 25 struct sock *sk = skb_to_full_sk(skb); in smack_ip_output() 32 skb->secmark = skp->smk_secid; in smack_ip_output()
|
| A D | smack_lsm.c | 4066 offset = skb_network_offset(skb); in smk_skb_to_addr_ipv6() 4105 if (skb == NULL || skb->secmark == 0) in smack_from_skb() 4129 struct sk_buff *skb) in smack_from_netlbl() argument 4183 skp = smack_from_skb(skb); in smack_socket_sock_rcv_skb() 4215 skp = smack_from_skb(skb); in smack_socket_sock_rcv_skb() 4301 if (skb != NULL) { in smack_socket_getpeersec_dgram() 4318 skp = smack_from_skb(skb); in smack_socket_getpeersec_dgram() 4334 skp = smack_from_skb(skb); in smack_socket_getpeersec_dgram() 4389 skp = smack_from_skb(skb); in smack_inet_conn_request() 4399 ad.a.u.net->netif = skb->skb_iif; in smack_inet_conn_request() [all …]
|
| /security/apparmor/ |
| A D | lsm.c | 1510 static int apparmor_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) in apparmor_socket_sock_rcv_skb() argument 1515 if (!skb->secmark) in apparmor_socket_sock_rcv_skb() 1527 AA_MAY_RECEIVE, skb->secmark, sk); in apparmor_socket_sock_rcv_skb() 1610 struct sk_buff *skb, u32 *secid) in apparmor_socket_getpeersec_dgram() argument 1638 static int apparmor_inet_conn_request(const struct sock *sk, struct sk_buff *skb, in apparmor_inet_conn_request() argument 1644 if (!skb->secmark) in apparmor_inet_conn_request() 1649 AA_MAY_CONNECT, skb->secmark, sk); in apparmor_inet_conn_request() 2356 struct sk_buff *skb, in apparmor_ip_postroute() argument 2363 if (!skb->secmark) in apparmor_ip_postroute() 2366 sk = skb_to_full_sk(skb); in apparmor_ip_postroute() [all …]
|