• Home
  • Raw
  • Download

Lines Matching refs:sk

4677 static int sock_has_perm(struct sock *sk, u32 perms)  in sock_has_perm()  argument
4679 struct sk_security_struct *sksec = sk->sk_security; in sock_has_perm()
4688 ad.u.net->sk = sk; in sock_has_perm()
4735 if (sock->sk) { in selinux_socket_post_create()
4736 sksec = sock->sk->sk_security; in selinux_socket_post_create()
4743 err = selinux_netlbl_socket_post_create(sock->sk, family); in selinux_socket_post_create()
4752 struct sk_security_struct *sksec_a = socka->sk->sk_security; in selinux_socket_socketpair()
4753 struct sk_security_struct *sksec_b = sockb->sk->sk_security; in selinux_socket_socketpair()
4767 struct sock *sk = sock->sk; in selinux_socket_bind() local
4768 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_bind()
4772 err = sock_has_perm(sk, SOCKET__BIND); in selinux_socket_bind()
4777 family = sk->sk_family; in selinux_socket_bind()
4840 inet_get_local_port_range(sock_net(sk), &low, &high); in selinux_socket_bind()
4842 if (inet_port_requires_bind_service(sock_net(sk), snum) || in selinux_socket_bind()
4844 err = sel_netport_sid(sk->sk_protocol, in selinux_socket_bind()
4909 struct sock *sk = sock->sk; in selinux_socket_connect_helper() local
4910 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_connect_helper()
4913 err = sock_has_perm(sk, SOCKET__CONNECT); in selinux_socket_connect_helper()
4967 err = sel_netport_sid(sk->sk_protocol, snum, &sid); in selinux_socket_connect_helper()
5001 struct sock *sk = sock->sk; in selinux_socket_connect() local
5007 return selinux_netlbl_socket_connect(sk, address); in selinux_socket_connect()
5012 return sock_has_perm(sock->sk, SOCKET__LISTEN); in selinux_socket_listen()
5023 err = sock_has_perm(sock->sk, SOCKET__ACCEPT); in selinux_socket_accept()
5044 return sock_has_perm(sock->sk, SOCKET__WRITE); in selinux_socket_sendmsg()
5050 return sock_has_perm(sock->sk, SOCKET__READ); in selinux_socket_recvmsg()
5055 return sock_has_perm(sock->sk, SOCKET__GETATTR); in selinux_socket_getsockname()
5060 return sock_has_perm(sock->sk, SOCKET__GETATTR); in selinux_socket_getpeername()
5067 err = sock_has_perm(sock->sk, SOCKET__SETOPT); in selinux_socket_setsockopt()
5077 return sock_has_perm(sock->sk, SOCKET__GETOPT); in selinux_socket_getsockopt()
5082 return sock_has_perm(sock->sk, SOCKET__SHUTDOWN); in selinux_socket_shutdown()
5098 ad.u.net->sk = other; in selinux_socket_unix_stream_connect()
5123 struct sk_security_struct *ssec = sock->sk->sk_security; in selinux_socket_unix_may_send()
5124 struct sk_security_struct *osec = other->sk->sk_security; in selinux_socket_unix_may_send()
5130 ad.u.net->sk = other->sk; in selinux_socket_unix_may_send()
5162 static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb, in selinux_sock_rcv_skb_compat() argument
5166 struct sk_security_struct *sksec = sk->sk_security; in selinux_sock_rcv_skb_compat()
5196 static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) in selinux_socket_sock_rcv_skb() argument
5199 struct sk_security_struct *sksec = sk->sk_security; in selinux_socket_sock_rcv_skb()
5200 u16 family = sk->sk_family; in selinux_socket_sock_rcv_skb()
5220 return selinux_sock_rcv_skb_compat(sk, skb, family); in selinux_socket_sock_rcv_skb()
5241 err = selinux_inet_sys_rcv_skb(sock_net(sk), skb->skb_iif, in selinux_socket_sock_rcv_skb()
5273 struct sk_security_struct *sksec = sock->sk->sk_security; in selinux_socket_getpeersec_stream()
5314 family = sock->sk->sk_family; in selinux_socket_getpeersec_dgram()
5331 static int selinux_sk_alloc_security(struct sock *sk, int family, gfp_t priority) in selinux_sk_alloc_security() argument
5343 sk->sk_security = sksec; in selinux_sk_alloc_security()
5348 static void selinux_sk_free_security(struct sock *sk) in selinux_sk_free_security() argument
5350 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_free_security()
5352 sk->sk_security = NULL; in selinux_sk_free_security()
5357 static void selinux_sk_clone_security(const struct sock *sk, struct sock *newsk) in selinux_sk_clone_security() argument
5359 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_clone_security()
5369 static void selinux_sk_getsecid(struct sock *sk, u32 *secid) in selinux_sk_getsecid() argument
5371 if (!sk) in selinux_sk_getsecid()
5374 struct sk_security_struct *sksec = sk->sk_security; in selinux_sk_getsecid()
5380 static void selinux_sock_graft(struct sock *sk, struct socket *parent) in selinux_sock_graft() argument
5384 struct sk_security_struct *sksec = sk->sk_security; in selinux_sock_graft()
5386 if (sk->sk_family == PF_INET || sk->sk_family == PF_INET6 || in selinux_sock_graft()
5387 sk->sk_family == PF_UNIX) in selinux_sock_graft()
5399 struct sk_security_struct *sksec = ep->base.sk->sk_security; in selinux_sctp_assoc_request()
5416 err = selinux_skb_peerlbl_sid(skb, ep->base.sk->sk_family, in selinux_sctp_assoc_request()
5440 ad.u.net->sk = ep->base.sk; in selinux_sctp_assoc_request()
5468 static int selinux_sctp_bind_connect(struct sock *sk, int optname, in selinux_sctp_bind_connect() argument
5481 sock = sk->sk_socket; in selinux_sctp_bind_connect()
5532 err = selinux_netlbl_socket_connect_locked(sk, addr); in selinux_sctp_bind_connect()
5547 static void selinux_sctp_sk_clone(struct sctp_endpoint *ep, struct sock *sk, in selinux_sctp_sk_clone() argument
5550 struct sk_security_struct *sksec = sk->sk_security; in selinux_sctp_sk_clone()
5557 return selinux_sk_clone_security(sk, newsk); in selinux_sctp_sk_clone()
5562 selinux_netlbl_sctp_sk_clone(sk, newsk); in selinux_sctp_sk_clone()
5565 static int selinux_inet_conn_request(const struct sock *sk, struct sk_buff *skb, in selinux_inet_conn_request() argument
5568 struct sk_security_struct *sksec = sk->sk_security; in selinux_inet_conn_request()
5603 static void selinux_inet_conn_established(struct sock *sk, struct sk_buff *skb) in selinux_inet_conn_established() argument
5605 u16 family = sk->sk_family; in selinux_inet_conn_established()
5606 struct sk_security_struct *sksec = sk->sk_security; in selinux_inet_conn_established()
5687 static int selinux_tun_dev_attach(struct sock *sk, void *security) in selinux_tun_dev_attach() argument
5690 struct sk_security_struct *sksec = sk->sk_security; in selinux_tun_dev_attach()
5805 struct sock *sk; in selinux_ip_output() local
5814 sk = skb->sk; in selinux_ip_output()
5815 if (sk) { in selinux_ip_output()
5818 if (sk_listener(sk)) in selinux_ip_output()
5834 sksec = sk->sk_security; in selinux_ip_output()
5864 struct sock *sk = skb_to_full_sk(skb); in selinux_ip_postroute_compat() local
5871 if (sk == NULL) in selinux_ip_postroute_compat()
5873 sksec = sk->sk_security; in selinux_ip_postroute_compat()
5901 struct sock *sk; in selinux_ip_postroute() local
5920 sk = skb_to_full_sk(skb); in selinux_ip_postroute()
5935 !(sk && sk_listener(sk))) in selinux_ip_postroute()
5939 if (sk == NULL) { in selinux_ip_postroute()
5952 } else if (sk_listener(sk)) { in selinux_ip_postroute()
5965 sksec = sk->sk_security; in selinux_ip_postroute()
5994 struct sk_security_struct *sksec = sk->sk_security; in selinux_ip_postroute()
6052 static int selinux_netlink_send(struct sock *sk, struct sk_buff *skb) in selinux_netlink_send() argument
6059 struct sk_security_struct *sksec = sk->sk_security; in selinux_netlink_send()
6077 rc = sock_has_perm(sk, perm); in selinux_netlink_send()
6085 sk->sk_protocol, nlh->nlmsg_type, in selinux_netlink_send()