Home
last modified time | relevance | path

Searched refs:secmark (Results 1 – 8 of 8) sorted by relevance

/security/apparmor/
Dnet.c192 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument
196 if (secmark->label[0] == '*') { in apparmor_secmark_init()
197 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
202 secmark->label, strlen(secmark->label), in apparmor_secmark_init()
208 secmark->secid = label->secid; in apparmor_secmark_init()
223 if (!profile->secmark[i].secid) { in aa_secmark_perm()
224 ret = apparmor_secmark_init(&profile->secmark[i]); in aa_secmark_perm()
229 if (profile->secmark[i].secid == secid || in aa_secmark_perm()
230 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
231 if (profile->secmark[i].deny) in aa_secmark_perm()
[all …]
Dpolicy_unpack.c583 profile->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark()
585 if (!profile->secmark) in unpack_secmark()
591 if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) in unpack_secmark()
593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark()
595 if (!unpack_strdup(e, &profile->secmark[i].label, NULL)) in unpack_secmark()
607 if (profile->secmark) { in unpack_secmark()
609 kfree(profile->secmark[i].label); in unpack_secmark()
610 kfree(profile->secmark); in unpack_secmark()
612 profile->secmark = NULL; in unpack_secmark()
Dlsm.c1048 if (!skb->secmark) in apparmor_socket_sock_rcv_skb()
1052 skb->secmark, sk); in apparmor_socket_sock_rcv_skb()
1152 if (!skb->secmark) in apparmor_inet_conn_request()
1156 skb->secmark, sk); in apparmor_inet_conn_request()
1747 if (!skb->secmark) in apparmor_ip_postroute()
1756 skb->secmark, sk)) in apparmor_ip_postroute()
Dpolicy.c230 kfree_sensitive(profile->secmark[i].label); in aa_free_profile()
231 kfree_sensitive(profile->secmark); in aa_free_profile()
/security/smack/
Dsmack_netfilter.c34 skb->secmark = skp->smk_secid; in smack_ipv6_output()
52 skb->secmark = skp->smk_secid; in smack_ipv4_output()
Dsmack_lsm.c3874 if (skb == NULL || skb->secmark == 0) in smack_from_skb()
3877 return smack_from_secid(skb->secmark); in smack_from_skb()
/security/apparmor/include/
Dpolicy.h155 struct aa_secmark *secmark; member
/security/selinux/
Dhooks.c5087 sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat()
5163 sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_socket_sock_rcv_skb()
5675 peer_sid, skb->secmark, in selinux_ip_forward()
5788 sksec->sid, skb->secmark, in selinux_ip_postroute_compat()
5912 peer_sid, skb->secmark, in selinux_ip_postroute()