• Home
  • Raw
  • Download

Lines Matching refs:sk

4533 static int sock_has_perm(struct sock *sk, u32 perms)  in sock_has_perm()  argument
4535 struct sk_security_struct *sksec = sk->sk_security; in sock_has_perm()
4544 ad.u.net->sk = sk; in sock_has_perm()
4591 if (sock->sk) { in selinux_socket_post_create()
4592 sksec = sock->sk->sk_security; in selinux_socket_post_create()
4599 err = selinux_netlbl_socket_post_create(sock->sk, family); in selinux_socket_post_create()
4608 struct sk_security_struct *sksec_a = socka->sk->sk_security; in selinux_socket_socketpair()
4609 struct sk_security_struct *sksec_b = sockb->sk->sk_security; in selinux_socket_socketpair()
4623 struct sock *sk = sock->sk; in selinux_socket_bind() local
4624 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_bind()
4628 err = sock_has_perm(sk, SOCKET__BIND); in selinux_socket_bind()
4633 family = sk->sk_family; in selinux_socket_bind()
4696 inet_get_local_port_range(sock_net(sk), &low, &high); in selinux_socket_bind()
4698 if (snum < max(inet_prot_sock(sock_net(sk)), low) || in selinux_socket_bind()
4700 err = sel_netport_sid(sk->sk_protocol, in selinux_socket_bind()
4765 struct sock *sk = sock->sk; in selinux_socket_connect_helper() local
4766 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_connect_helper()
4769 err = sock_has_perm(sk, SOCKET__CONNECT); in selinux_socket_connect_helper()
4823 err = sel_netport_sid(sk->sk_protocol, snum, &sid); in selinux_socket_connect_helper()
4857 struct sock *sk = sock->sk; in selinux_socket_connect() local
4863 return selinux_netlbl_socket_connect(sk, address); in selinux_socket_connect()
4868 return sock_has_perm(sock->sk, SOCKET__LISTEN); in selinux_socket_listen()
4879 err = sock_has_perm(sock->sk, SOCKET__ACCEPT); in selinux_socket_accept()
4900 return sock_has_perm(sock->sk, SOCKET__WRITE); in selinux_socket_sendmsg()
4906 return sock_has_perm(sock->sk, SOCKET__READ); in selinux_socket_recvmsg()
4911 return sock_has_perm(sock->sk, SOCKET__GETATTR); in selinux_socket_getsockname()
4916 return sock_has_perm(sock->sk, SOCKET__GETATTR); in selinux_socket_getpeername()
4923 err = sock_has_perm(sock->sk, SOCKET__SETOPT); in selinux_socket_setsockopt()
4933 return sock_has_perm(sock->sk, SOCKET__GETOPT); in selinux_socket_getsockopt()
4938 return sock_has_perm(sock->sk, SOCKET__SHUTDOWN); in selinux_socket_shutdown()
4954 ad.u.net->sk = other; in selinux_socket_unix_stream_connect()
4979 struct sk_security_struct *ssec = sock->sk->sk_security; in selinux_socket_unix_may_send()
4980 struct sk_security_struct *osec = other->sk->sk_security; in selinux_socket_unix_may_send()
4986 ad.u.net->sk = other->sk; in selinux_socket_unix_may_send()
5018 static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb, in selinux_sock_rcv_skb_compat() argument
5022 struct sk_security_struct *sksec = sk->sk_security; in selinux_sock_rcv_skb_compat()
5052 static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) in selinux_socket_sock_rcv_skb() argument
5055 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_sock_rcv_skb()
5056 u16 family = sk->sk_family; in selinux_socket_sock_rcv_skb()
5076 return selinux_sock_rcv_skb_compat(sk, skb, family); in selinux_socket_sock_rcv_skb()
5097 err = selinux_inet_sys_rcv_skb(sock_net(sk), skb->skb_iif, in selinux_socket_sock_rcv_skb()
5129 struct sk_security_struct *sksec = sock->sk->sk_security; in selinux_socket_getpeersec_stream()
5170 family = sock->sk->sk_family; in selinux_socket_getpeersec_dgram()
5187 static int selinux_sk_alloc_security(struct sock *sk, int family, gfp_t priority) in selinux_sk_alloc_security() argument
5199 sk->sk_security = sksec; in selinux_sk_alloc_security()
5204 static void selinux_sk_free_security(struct sock *sk) in selinux_sk_free_security() argument
5206 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_free_security()
5208 sk->sk_security = NULL; in selinux_sk_free_security()
5213 static void selinux_sk_clone_security(const struct sock *sk, struct sock *newsk) in selinux_sk_clone_security() argument
5215 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_clone_security()
5225 static void selinux_sk_getsecid(struct sock *sk, u32 *secid) in selinux_sk_getsecid() argument
5227 if (!sk) in selinux_sk_getsecid()
5230 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_getsecid()
5236 static void selinux_sock_graft(struct sock *sk, struct socket *parent) in selinux_sock_graft() argument
5240 struct sk_security_struct *sksec = sk->sk_security; in selinux_sock_graft()
5242 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || in selinux_sock_graft()
5243 sk->sk_family == PF_UNIX) in selinux_sock_graft()
5255 struct sk_security_struct *sksec = ep->base.sk->sk_security; in selinux_sctp_assoc_request()
5272 err = selinux_skb_peerlbl_sid(skb, ep->base.sk->sk_family, in selinux_sctp_assoc_request()
5296 ad.u.net->sk = ep->base.sk; in selinux_sctp_assoc_request()
5324 static int selinux_sctp_bind_connect(struct sock *sk, int optname, in selinux_sctp_bind_connect() argument
5337 sock = sk->sk_socket; in selinux_sctp_bind_connect()
5388 err = selinux_netlbl_socket_connect_locked(sk, addr); in selinux_sctp_bind_connect()
5403 static void selinux_sctp_sk_clone(struct sctp_endpoint *ep, struct sock *sk, in selinux_sctp_sk_clone() argument
5406 struct sk_security_struct *sksec = sk->sk_security; in selinux_sctp_sk_clone()
5413 return selinux_sk_clone_security(sk, newsk); in selinux_sctp_sk_clone()
5418 selinux_netlbl_sctp_sk_clone(sk, newsk); in selinux_sctp_sk_clone()
5421 static int selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb, in selinux_inet_conn_request() argument
5424 struct sk_security_struct *sksec = sk->sk_security; in selinux_inet_conn_request()
5459 static void selinux_inet_conn_established(struct sock *sk, struct sk_buff *skb) in selinux_inet_conn_established() argument
5461 u16 family = sk->sk_family; in selinux_inet_conn_established()
5462 struct sk_security_struct *sksec = sk->sk_security; in selinux_inet_conn_established()
5543 static int selinux_tun_dev_attach(struct sock *sk, void *security) in selinux_tun_dev_attach() argument
5546 struct sk_security_struct *sksec = sk->sk_security; in selinux_tun_dev_attach()
5582 static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) in selinux_nlmsg_perm() argument
5589 struct sk_security_struct *sksec = sk->sk_security; in selinux_nlmsg_perm()
5607 rc = sock_has_perm(sk, perm); in selinux_nlmsg_perm()
5615 sk->sk_protocol, nlh->nlmsg_type, in selinux_nlmsg_perm()
5719 struct sock *sk; in selinux_ip_output() local
5728 sk = skb->sk; in selinux_ip_output()
5729 if (sk) { in selinux_ip_output()
5732 if (sk_listener(sk)) in selinux_ip_output()
5748 sksec = sk->sk_security; in selinux_ip_output()
5778 struct sock *sk = skb_to_full_sk(skb); in selinux_ip_postroute_compat() local
5785 if (sk == NULL) in selinux_ip_postroute_compat()
5787 sksec = sk->sk_security; in selinux_ip_postroute_compat()
5815 struct sock *sk; in selinux_ip_postroute() local
5834 sk = skb_to_full_sk(skb); in selinux_ip_postroute()
5849 !(sk && sk_listener(sk))) in selinux_ip_postroute()
5853 if (sk == NULL) { in selinux_ip_postroute()
5866 } else if (sk_listener(sk)) { in selinux_ip_postroute()
5879 sksec = sk->sk_security; in selinux_ip_postroute()
5908 struct sk_security_struct *sksec = sk->sk_security; in selinux_ip_postroute()
5966 static int selinux_netlink_send(struct sock *sk, struct sk_buff *skb) in selinux_netlink_send() argument
5968 return selinux_nlmsg_perm(sk, skb); in selinux_netlink_send()