Searched refs:req (Results 1 – 6 of 6) sorted by relevance
/security/selinux/include/ |
D | netlabel.h | 56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 115 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
|
/security/selinux/ |
D | netlabel.c | 256 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument 265 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request() 268 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
|
D | hooks.c | 4518 struct request_sock *req) in selinux_inet_conn_request() argument 4534 req->secid = sksec->sid; in selinux_inet_conn_request() 4535 req->peer_secid = SECSID_NULL; in selinux_inet_conn_request() 4540 req->secid = newsid; in selinux_inet_conn_request() 4541 req->peer_secid = peersid; in selinux_inet_conn_request() 4544 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request() 4548 const struct request_sock *req) in selinux_inet_csk_clone() argument 4552 newsksec->sid = req->secid; in selinux_inet_csk_clone() 4553 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone() 4561 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone() [all …]
|
/security/ |
D | security.c | 1228 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) in security_req_classify_flow() argument 1230 security_ops->req_classify_flow(req, fl); in security_req_classify_flow() 1241 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument 1243 return security_ops->inet_conn_request(sk, skb, req); in security_inet_conn_request() 1248 const struct request_sock *req) in security_inet_csk_clone() argument 1250 security_ops->inet_csk_clone(newsk, req); in security_inet_csk_clone()
|
D | capability.c | 701 struct request_sock *req) in cap_inet_conn_request() argument 707 const struct request_sock *req) in cap_inet_csk_clone() argument 728 static void cap_req_classify_flow(const struct request_sock *req, in cap_req_classify_flow() argument
|
/security/smack/ |
D | smack_lsm.c | 3050 struct request_sock *req) in smack_inet_conn_request() argument 3096 req->peer_secid = smack_to_secid(sp); in smack_inet_conn_request() 3111 rc = netlbl_req_setattr(req, &skp->smk_netlabel); in smack_inet_conn_request() 3113 netlbl_req_delattr(req); in smack_inet_conn_request() 3126 const struct request_sock *req) in smack_inet_csk_clone() argument 3130 if (req->peer_secid != 0) in smack_inet_csk_clone() 3131 ssp->smk_packet = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
|