Lines Matching refs:family
1187 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument
1191 switch (family) { in socket_type_to_security_class()
1273 switch (family) { in socket_type_to_security_class()
1333 #error New address family defined, please update this function. in socket_type_to_security_class()
4566 switch (ad->u.net->family) { in selinux_parse_skb()
4616 static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, u32 *sid) in selinux_skb_peerlbl_sid() argument
4626 err = selinux_netlbl_skbuff_getsid(skb, family, &nlbl_type, &nlbl_sid); in selinux_skb_peerlbl_sid()
4699 static int selinux_socket_create(int family, int type, in selinux_socket_create() argument
4710 secclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_create()
4719 static int selinux_socket_post_create(struct socket *sock, int family, in selinux_socket_post_create() argument
4725 u16 sclass = socket_type_to_security_class(family, type, protocol); in selinux_socket_post_create()
4747 err = selinux_netlbl_socket_post_create(sock->sk, family); in selinux_socket_post_create()
4773 u16 family; in selinux_socket_bind() local
4781 family = sk->sk_family; in selinux_socket_bind()
4782 if (family == PF_INET || family == PF_INET6) { in selinux_socket_bind()
4808 if (family == PF_INET6) { in selinux_socket_bind()
4839 ad.u.net->family = family_sa; in selinux_socket_bind()
4990 ad.u.net->family = address->sa_family; in selinux_socket_connect_helper()
5142 char *addrp, u16 family, u32 peer_sid, in selinux_inet_sys_rcv_skb() argument
5158 err = sel_netnode_sid(addrp, family, &node_sid); in selinux_inet_sys_rcv_skb()
5167 u16 family) in selinux_sock_rcv_skb_compat() argument
5179 ad.u.net->family = family; in selinux_sock_rcv_skb_compat()
5192 err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad); in selinux_sock_rcv_skb_compat()
5204 u16 family = sk->sk_family; in selinux_socket_sock_rcv_skb() local
5212 if (family != PF_INET && family != PF_INET6) in selinux_socket_sock_rcv_skb()
5216 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in selinux_socket_sock_rcv_skb()
5217 family = PF_INET; in selinux_socket_sock_rcv_skb()
5224 return selinux_sock_rcv_skb_compat(sk, skb, family); in selinux_socket_sock_rcv_skb()
5234 ad.u.net->family = family; in selinux_socket_sock_rcv_skb()
5242 err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); in selinux_socket_sock_rcv_skb()
5246 addrp, family, peer_sid, &ad); in selinux_socket_sock_rcv_skb()
5248 selinux_netlbl_err(skb, family, err, 0); in selinux_socket_sock_rcv_skb()
5255 selinux_netlbl_err(skb, family, err, 0); in selinux_socket_sock_rcv_skb()
5310 u16 family; in selinux_socket_getpeersec_dgram() local
5314 family = PF_INET; in selinux_socket_getpeersec_dgram()
5316 family = PF_INET6; in selinux_socket_getpeersec_dgram()
5318 family = sock->sk->sk_family; in selinux_socket_getpeersec_dgram()
5322 if (sock && family == PF_UNIX) { in selinux_socket_getpeersec_dgram()
5326 selinux_skb_peerlbl_sid(skb, family, &peer_secid); in selinux_socket_getpeersec_dgram()
5335 static int selinux_sk_alloc_security(struct sock *sk, int family, gfp_t priority) in selinux_sk_alloc_security() argument
5574 u16 family = req->rsk_ops->family; in selinux_inet_conn_request() local
5578 err = selinux_skb_peerlbl_sid(skb, family, &peersid); in selinux_inet_conn_request()
5587 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request()
5604 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone()
5609 u16 family = sk->sk_family; in selinux_inet_conn_established() local
5613 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in selinux_inet_conn_established()
5614 family = PF_INET; in selinux_inet_conn_established()
5616 selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid); in selinux_inet_conn_established()
5734 u16 family) in selinux_ip_forward() argument
5754 if (selinux_skb_peerlbl_sid(skb, family, &peer_sid) != 0) in selinux_ip_forward()
5760 ad.u.net->family = family; in selinux_ip_forward()
5766 addrp, family, peer_sid, &ad); in selinux_ip_forward()
5768 selinux_netlbl_err(skb, family, err, 1); in selinux_ip_forward()
5784 if (selinux_netlbl_skbuff_setsid(skb, family, peer_sid) != 0) in selinux_ip_forward()
5807 u16 family) in selinux_ip_output() argument
5842 if (selinux_netlbl_skbuff_setsid(skb, family, sid) != 0) in selinux_ip_output()
5866 u16 family) in selinux_ip_postroute_compat() argument
5882 ad.u.net->family = family; in selinux_ip_postroute_compat()
5900 u16 family) in selinux_ip_postroute() argument
5917 return selinux_ip_postroute_compat(skb, ifindex, family); in selinux_ip_postroute()
5950 if (selinux_skb_peerlbl_sid(skb, family, &peer_sid)) in selinux_ip_postroute()
5970 if (selinux_skb_peerlbl_sid(skb, family, &skb_sid)) in selinux_ip_postroute()
5979 switch (family) { in selinux_ip_postroute()
6006 ad.u.net->family = family; in selinux_ip_postroute()
6027 if (sel_netnode_sid(addrp, family, &node_sid)) in selinux_ip_postroute()