| /linux/net/netfilter/ |
| H A D | xt_CONNSECMARK.c | 34 if (skb->secmark) { in secmark_save() 39 if (ct && !ct->secmark) { in secmark_save() 40 ct->secmark = skb->secmark; in secmark_save() 52 if (!skb->secmark) { in secmark_restore() 57 if (ct && ct->secmark) in secmark_restore() 58 skb->secmark = ct->secmark; in secmark_restore()
|
| H A D | xt_SECMARK.c | 29 u32 secmark = 0; in secmark_tg() local 33 secmark = info->secid; in secmark_tg() 39 skb->secmark = secmark; in secmark_tg()
|
| H A D | nft_ct_fast.c | 52 *dest = ct->secmark; in nft_ct_get_fast_eval()
|
| H A D | nft_meta.c | 362 *dest = skb->secmark; in nft_meta_get_eval() 450 skb->secmark = value; in nft_meta_set_eval() 942 skb->secmark = priv->secid; in nft_secmark_obj_eval()
|
| H A D | nft_ct.c | 97 *dest = ct->secmark; in nft_ct_get_eval() 302 if (ct->secmark != value) { in nft_ct_set_eval() 303 ct->secmark = value; in nft_ct_set_eval()
|
| H A D | nfnetlink_queue.c | 594 if (skb->secmark) in nfqnl_get_sk_secctx() 595 seclen = security_secid_to_secctx(skb->secmark, ctx); in nfqnl_get_sk_secctx()
|
| H A D | nf_conntrack_netlink.c | 364 ret = security_secid_to_secctx(ct->secmark, &ctx); in ctnetlink_dump_secctx() 686 ret = security_secid_to_secctx(ct->secmark, NULL); in ctnetlink_secctx_size() 837 if ((events & (1 << IPCT_SECMARK) || ct->secmark) in ctnetlink_conntrack_event() 2731 if (ct->secmark && ctnetlink_dump_secctx(skb, ct) < 0) in __ctnetlink_glue_build()
|
| H A D | nf_conntrack_core.c | 1831 ct->secmark = exp->master->secmark; in init_conntrack()
|
| /linux/security/apparmor/ |
| H A D | net.c | 340 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument 344 if (secmark->label[0] == '*') { in apparmor_secmark_init() 345 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 350 secmark->label, strlen(secmark->label), in apparmor_secmark_init() 356 secmark->secid = label->secid; in apparmor_secmark_init() 372 if (!rules->secmark[i].secid) { in aa_secmark_perm() 373 ret = apparmor_secmark_init(&rules->secmark[i]); in aa_secmark_perm() 378 if (rules->secmark[i].secid == secid || in aa_secmark_perm() 379 rules->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 380 if (rules->secmark[i].deny) in aa_secmark_perm() [all …]
|
| H A D | policy_unpack.c | 630 rules->secmark = kzalloc_objs(struct aa_secmark, size); in unpack_secmark() 631 if (!rules->secmark) in unpack_secmark() 637 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 639 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 641 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 653 if (rules->secmark) { in unpack_secmark() 655 kfree_sensitive(rules->secmark[i].label); in unpack_secmark() 656 kfree_sensitive(rules->secmark); in unpack_secmark() 658 rules->secmark = NULL; in unpack_secmark()
|
| H A D | lsm.c | 1508 if (!skb->secmark) in apparmor_socket_sock_rcv_skb() 1520 AA_MAY_RECEIVE, skb->secmark, sk); in apparmor_socket_sock_rcv_skb() 1637 if (!skb->secmark) in apparmor_inet_conn_request() 1642 AA_MAY_CONNECT, skb->secmark, sk); in apparmor_inet_conn_request() 2376 if (!skb->secmark) in apparmor_ip_postroute() 2386 AA_MAY_SEND, skb->secmark, sk); in apparmor_ip_postroute()
|
| H A D | policy.c | 293 kfree_sensitive(rules->secmark[i].label); in free_ruleset() 294 kfree_sensitive(rules->secmark); in free_ruleset()
|
| /linux/security/smack/ |
| H A D | smack_netfilter.c | 32 skb->secmark = skp->smk_secid; in smack_ip_output()
|
| H A D | smack_lsm.c | 4198 if (skb == NULL || skb->secmark == 0) in smack_from_skb() 4201 return smack_from_secid(skb->secmark); in smack_from_skb()
|
| /linux/security/apparmor/include/ |
| H A D | policy.h | 202 struct aa_secmark *secmark; member
|
| /linux/include/net/netfilter/ |
| H A D | nf_conntrack.h | 117 u_int32_t secmark; 116 u_int32_t secmark; global() member
|
| /linux/include/linux/ |
| H A D | skbuff.h | 1063 __u32 secmark; 5156 to->secmark = from->secmark; in skb_copy_secmark() 5161 skb->secmark = 0; in skb_init_secmark()
|
| /linux/security/selinux/ |
| H A D | hooks.c | 5287 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat() 5356 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_socket_sock_rcv_skb() 5892 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_forward() 5969 if (avc_has_perm(sksec->sid, skb->secmark, in selinux_ip_postroute_compat() 6091 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_postroute()
|
| /linux/net/core/ |
| H A D | skbuff.c | 1592 CHECK_SKB_FIELD(secmark); in __copy_skb_header()
|