Searched refs:secmark (Results 1 – 15 of 15) sorted by relevance
/linux-4.1.27/net/netfilter/ |
D | xt_CONNSECMARK.c | 38 if (skb->secmark) { in secmark_save() 43 if (ct && !ct->secmark) { in secmark_save() 44 ct->secmark = skb->secmark; in secmark_save() 56 if (!skb->secmark) { in secmark_restore() 61 if (ct && ct->secmark) in secmark_restore() 62 skb->secmark = ct->secmark; in secmark_restore()
|
D | xt_SECMARK.c | 35 u32 secmark = 0; in secmark_tg() local 42 secmark = info->secid; in secmark_tg() 48 skb->secmark = secmark; in secmark_tg()
|
D | xt_AUDIT.c | 171 if (skb->secmark) in audit_tg() 172 audit_log_secctx(ab, skb->secmark); in audit_tg()
|
D | nft_meta.c | 129 *dest = skb->secmark; in nft_meta_get_eval()
|
D | nft_ct.c | 80 *dest = ct->secmark; in nft_ct_get_eval()
|
D | nf_conntrack_standalone.c | 129 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
|
D | nf_conntrack_netlink.c | 311 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ctnetlink_dump_secctx() 553 ret = security_secid_to_secctx(ct->secmark, NULL, &len); in ctnetlink_secctx_size() 699 if ((events & (1 << IPCT_SECMARK) || ct->secmark) in ctnetlink_conntrack_event() 2132 if (ct->secmark && ctnetlink_dump_secctx(skb, ct) < 0) in ctnetlink_nfqueue_build()
|
D | nf_conntrack_core.c | 969 ct->secmark = exp->master->secmark; in init_conntrack()
|
/linux-4.1.27/security/smack/ |
D | smack_netfilter.c | 34 skb->secmark = skp->smk_secid; in smack_ipv6_output() 51 skb->secmark = skp->smk_secid; in smack_ipv4_output()
|
D | smack_lsm.c | 3634 if (skb && skb->secmark != 0) { in smack_socket_sock_rcv_skb() 3635 skp = smack_from_secid(skb->secmark); in smack_socket_sock_rcv_skb() 3679 if (skb && skb->secmark != 0) in smack_socket_sock_rcv_skb() 3680 skp = smack_from_secid(skb->secmark); in smack_socket_sock_rcv_skb() 3775 s = skb->secmark; in smack_socket_getpeersec_dgram() 3795 s = skb->secmark; in smack_socket_getpeersec_dgram() 3874 if (skb && skb->secmark != 0) { in smack_inet_conn_request() 3875 skp = smack_from_secid(skb->secmark); in smack_inet_conn_request()
|
/linux-4.1.27/include/net/netfilter/ |
D | nf_conntrack.h | 111 u_int32_t secmark; member
|
/linux-4.1.27/net/ipv4/netfilter/ |
D | nf_conntrack_l3proto_ipv4_compat.c | 103 ret = security_secid_to_secctx(ct->secmark, &secctx, &len); in ct_show_secctx()
|
/linux-4.1.27/include/linux/ |
D | skbuff.h | 647 __u32 secmark; member 3243 to->secmark = from->secmark; in skb_copy_secmark() 3248 skb->secmark = 0; in skb_init_secmark()
|
/linux-4.1.27/security/selinux/ |
D | hooks.c | 4398 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_sock_rcv_skb_compat() 4472 err = avc_has_perm(sk_sid, skb->secmark, SECCLASS_PACKET, in selinux_socket_sock_rcv_skb() 4834 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_forward() 4937 if (avc_has_perm(sksec->sid, skb->secmark, in selinux_ip_postroute_compat() 5058 if (avc_has_perm(peer_sid, skb->secmark, in selinux_ip_postroute()
|
/linux-4.1.27/net/core/ |
D | skbuff.c | 843 CHECK_SKB_FIELD(secmark); in __copy_skb_header()
|