Home
last modified time | relevance | path

Searched refs:secmark (Results 1 – 17 of 17) sorted by relevance

/linux/net/netfilter/
H A Dxt_CONNSECMARK.c34 if (skb->secmark) { in secmark_save()
39 if (ct && !ct->secmark) { in secmark_save()
40 ct->secmark = skb->secmark; in secmark_save()
52 if (!skb->secmark) { in secmark_restore()
57 if (ct && ct->secmark) in secmark_restore()
58 skb->secmark = ct->secmark; in secmark_restore()
H A Dxt_SECMARK.c29 u32 secmark = 0; in secmark_tg() local
33 secmark = info->secid; in secmark_tg()
39 skb->secmark = secmark; in secmark_tg()
H A Dnft_ct_fast.c52 *dest = ct->secmark; in nft_ct_get_fast_eval()
H A Dnft_ct.c98 *dest = ct->secmark; in nft_ct_get_eval()
303 if (ct->secmark != value) { in nft_ct_set_eval()
304 ct->secmark = value; in nft_ct_set_eval()
H A Dnfnetlink_queue.c572 if (skb->secmark) in nfqnl_get_sk_secctx()
573 seclen = security_secid_to_secctx(skb->secmark, ctx); in nfqnl_get_sk_secctx()
H A Dnf_conntrack_netlink.c362 ret = security_secid_to_secctx(ct->secmark, &ctx); in ctnetlink_dump_secctx()
684 ret = security_secid_to_secctx(ct->secmark, NULL); in ctnetlink_secctx_size()
835 if ((events & (1 << IPCT_SECMARK) || ct->secmark) in ctnetlink_conntrack_event()
2723 if (ct->secmark && ctnetlink_dump_secctx(skb, ct) < 0) in __ctnetlink_glue_build()
H A Dnf_conntrack_core.c1831 ct->secmark = exp->master->secmark; in init_conntrack()
/linux/security/apparmor/
H A Dnet.c340 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument
344 if (secmark->label[0] == '*') { in apparmor_secmark_init()
345 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init()
350 secmark->label, strlen(secmark->label), in apparmor_secmark_init()
356 secmark->secid = label->secid; in apparmor_secmark_init()
372 if (!rules->secmark[i].secid) { in aa_secmark_perm()
373 ret = apparmor_secmark_init(&rules->secmark[i]); in aa_secmark_perm()
378 if (rules->secmark[i].secid == secid || in aa_secmark_perm()
379 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm()
380 if (rules->secmark[i].deny) in aa_secmark_perm()
[all …]
H A Dpolicy_unpack.c630 rules->secmark = kzalloc_objs(struct aa_secmark, size); in unpack_secmark()
631 if (!rules->secmark) in unpack_secmark()
637 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark()
639 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark()
641 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark()
653 if (rules->secmark) { in unpack_secmark()
655 kfree_sensitive(rules->secmark[i].label); in unpack_secmark()
656 kfree_sensitive(rules->secmark); in unpack_secmark()
658 rules->secmark = NULL; in unpack_secmark()
H A Dlsm.c1504 if (!skb->secmark) in apparmor_socket_sock_rcv_skb()
1516 AA_MAY_RECEIVE, skb->secmark, sk); in apparmor_socket_sock_rcv_skb()
1629 if (!skb->secmark) in apparmor_inet_conn_request()
1634 AA_MAY_CONNECT, skb->secmark, sk); in apparmor_inet_conn_request()
2367 if (!skb->secmark) in apparmor_ip_postroute()
2377 AA_MAY_SEND, skb->secmark, sk); in apparmor_ip_postroute()
H A Dpolicy.c293 kfree_sensitive(rules->secmark[i].label); in free_ruleset()
294 kfree_sensitive(rules->secmark); in free_ruleset()
/linux/security/smack/
H A Dsmack_netfilter.c32 skb->secmark = skp->smk_secid; in smack_ip_output()
H A Dsmack_lsm.c4189 * smack_from_skb - Smack data from the secmark in an skb
4192 * Returns smack_known of the secmark or NULL if that won't work.
4197 if (skb == NULL || skb->secmark == 0) in smack_from_skb()
4200 return smack_from_secid(skb->secmark); in smack_from_skb()
4271 * If there is a secmark use it rather than the CIPSO label. in smack_socket_sock_rcv_skb()
4272 * If there is no secmark fall back to CIPSO. in smack_socket_sock_rcv_skb()
4273 * The secmark is assumed to reflect policy better. in smack_socket_sock_rcv_skb()
4476 * If there is a secmark use it rather than the CIPSO label. in smack_inet_conn_request()
4477 * If there is no secmark fall back to CIPSO. in smack_inet_conn_request()
4478 * The secmark i in smack_inet_conn_request()
[all...]
/linux/security/apparmor/include/
H A Dpolicy.h202 struct aa_secmark *secmark; member
/linux/include/linux/
H A Dskbuff.h1063 __u32 secmark;
5183 to->secmark = from->secmark; in skb_copy_secmark()
5188 skb->secmark = 0; in skb_init_secmark()
/linux/security/selinux/
H A Dhooks.c5395 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat()
5464 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_socket_sock_rcv_skb()
6000 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_forward()
6077 if (avc_has_perm(sksec->sid, skb->secmark, in selinux_ip_postroute_compat()
6199 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_postroute()
/linux/net/core/
H A Dskbuff.c1579 CHECK_SKB_FIELD(secmark); in __copy_skb_header()