sksec 4482 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 4486 security/selinux/hooks.c if (sksec->sid == SECINITSID_KERNEL) sksec 4494 security/selinux/hooks.c current_sid(), sksec->sid, sksec->sclass, perms, sksec 4523 security/selinux/hooks.c struct sk_security_struct *sksec; sksec 4539 security/selinux/hooks.c sksec = sock->sk->sk_security; sksec 4540 security/selinux/hooks.c sksec->sclass = sclass; sksec 4541 security/selinux/hooks.c sksec->sid = sid; sksec 4543 security/selinux/hooks.c if (sksec->sclass == SECCLASS_SCTP_SOCKET) sksec 4544 security/selinux/hooks.c sksec->sctp_assoc_state = SCTP_ASSOC_UNSET; sksec 4571 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 4645 security/selinux/hooks.c sksec->sid, sid, sksec 4646 security/selinux/hooks.c sksec->sclass, sksec 4653 security/selinux/hooks.c switch (sksec->sclass) { sksec 4685 security/selinux/hooks.c sksec->sid, sid, sksec 4686 security/selinux/hooks.c sksec->sclass, node_perm, &ad); sksec 4694 security/selinux/hooks.c if (sksec->sclass == SECCLASS_SCTP_SOCKET) sksec 4706 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 4725 security/selinux/hooks.c if (sksec->sclass == SECCLASS_TCP_SOCKET || sksec 4726 security/selinux/hooks.c sksec->sclass == SECCLASS_DCCP_SOCKET || sksec 4727 security/selinux/hooks.c sksec->sclass == SECCLASS_SCTP_SOCKET) { sksec 4757 security/selinux/hooks.c if (sksec->sclass == SECCLASS_SCTP_SOCKET) sksec 4767 security/selinux/hooks.c switch (sksec->sclass) { sksec 4784 security/selinux/hooks.c sksec->sid, sid, sksec->sclass, perm, &ad); sksec 4962 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 4963 security/selinux/hooks.c u32 sk_sid = sksec->sid; sksec 4984 security/selinux/hooks.c err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad); sksec 4987 security/selinux/hooks.c err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad); sksec 4995 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 4997 security/selinux/hooks.c u32 sk_sid = sksec->sid; sksec 5069 security/selinux/hooks.c struct sk_security_struct *sksec = sock->sk->sk_security; sksec 5072 security/selinux/hooks.c if (sksec->sclass == SECCLASS_UNIX_STREAM_SOCKET || sksec 5073 security/selinux/hooks.c sksec->sclass == SECCLASS_TCP_SOCKET || sksec 5074 security/selinux/hooks.c sksec->sclass == SECCLASS_SCTP_SOCKET) sksec 5075 security/selinux/hooks.c peer_sid = sksec->peer_sid; sksec 5129 security/selinux/hooks.c struct sk_security_struct *sksec; sksec 5131 security/selinux/hooks.c sksec = kzalloc(sizeof(*sksec), priority); sksec 5132 security/selinux/hooks.c if (!sksec) sksec 5135 security/selinux/hooks.c sksec->peer_sid = SECINITSID_UNLABELED; sksec 5136 security/selinux/hooks.c sksec->sid = SECINITSID_UNLABELED; sksec 5137 security/selinux/hooks.c sksec->sclass = SECCLASS_SOCKET; sksec 5138 security/selinux/hooks.c selinux_netlbl_sk_security_reset(sksec); sksec 5139 security/selinux/hooks.c sk->sk_security = sksec; sksec 5146 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5149 security/selinux/hooks.c selinux_netlbl_sk_security_free(sksec); sksec 5150 security/selinux/hooks.c kfree(sksec); sksec 5155 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5158 security/selinux/hooks.c newsksec->sid = sksec->sid; sksec 5159 security/selinux/hooks.c newsksec->peer_sid = sksec->peer_sid; sksec 5160 security/selinux/hooks.c newsksec->sclass = sksec->sclass; sksec 5170 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5172 security/selinux/hooks.c *secid = sksec->sid; sksec 5180 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5184 security/selinux/hooks.c isec->sid = sksec->sid; sksec 5185 security/selinux/hooks.c sksec->sclass = isec->sclass; sksec 5195 security/selinux/hooks.c struct sk_security_struct *sksec = ep->base.sk->sk_security; sksec 5221 security/selinux/hooks.c if (sksec->sctp_assoc_state == SCTP_ASSOC_UNSET) { sksec 5222 security/selinux/hooks.c sksec->sctp_assoc_state = SCTP_ASSOC_SET; sksec 5229 security/selinux/hooks.c sksec->peer_sid = peer_sid; sksec 5230 security/selinux/hooks.c } else if (sksec->peer_sid != peer_sid) { sksec 5238 security/selinux/hooks.c sksec->peer_sid, peer_sid, sksec->sclass, sksec 5250 security/selinux/hooks.c err = selinux_conn_sid(sksec->sid, peer_sid, &conn_sid); sksec 5346 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5357 security/selinux/hooks.c newsksec->sclass = sksec->sclass; sksec 5364 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5373 security/selinux/hooks.c err = selinux_conn_sid(sksec->sid, peersid, &connsid); sksec 5402 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5408 security/selinux/hooks.c selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid); sksec 5486 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5495 security/selinux/hooks.c sksec->sid = tunsec->sid; sksec 5496 security/selinux/hooks.c sksec->sclass = SECCLASS_TUN_SOCKET; sksec 5529 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5530 security/selinux/hooks.c u16 sclass = sksec->sclass; sksec 5670 security/selinux/hooks.c struct sk_security_struct *sksec; sksec 5688 security/selinux/hooks.c sksec = sk->sk_security; sksec 5689 security/selinux/hooks.c sid = sksec->sid; sksec 5719 security/selinux/hooks.c struct sk_security_struct *sksec; sksec 5727 security/selinux/hooks.c sksec = sk->sk_security; sksec 5738 security/selinux/hooks.c sksec->sid, skb->secmark, sksec 5742 security/selinux/hooks.c if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto)) sksec 5817 security/selinux/hooks.c struct sk_security_struct *sksec; sksec 5819 security/selinux/hooks.c sksec = sk->sk_security; sksec 5842 security/selinux/hooks.c if (selinux_conn_sid(sksec->sid, skb_sid, &peer_sid)) sksec 5848 security/selinux/hooks.c struct sk_security_struct *sksec = sk->sk_security; sksec 5849 security/selinux/hooks.c peer_sid = sksec->sid; sksec 32 security/selinux/include/netlabel.h void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec); sksec 33 security/selinux/include/netlabel.h void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec); sksec 48 security/selinux/include/netlabel.h int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, sksec 74 security/selinux/include/netlabel.h struct sk_security_struct *sksec) sksec 80 security/selinux/include/netlabel.h struct sk_security_struct *sksec) sksec 131 security/selinux/include/netlabel.h static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, sksec 70 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 73 security/selinux/netlabel.c if (sksec->nlbl_secattr != NULL) sksec 74 security/selinux/netlabel.c return sksec->nlbl_secattr; sksec 79 security/selinux/netlabel.c rc = security_netlbl_sid_to_secattr(&selinux_state, sksec->sid, sksec 85 security/selinux/netlabel.c sksec->nlbl_secattr = secattr; sksec 103 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 104 security/selinux/netlabel.c struct netlbl_lsm_secattr *secattr = sksec->nlbl_secattr; sksec 154 security/selinux/netlabel.c void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec) sksec 156 security/selinux/netlabel.c if (sksec->nlbl_secattr != NULL) sksec 157 security/selinux/netlabel.c netlbl_secattr_free(sksec->nlbl_secattr); sksec 170 security/selinux/netlabel.c void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec) sksec 172 security/selinux/netlabel.c sksec->nlbl_state = NLBL_UNSET; sksec 238 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 240 security/selinux/netlabel.c if (sksec->nlbl_state != NLBL_REQSKB) sksec 276 security/selinux/netlabel.c struct sk_security_struct *sksec = ep->base.sk->sk_security; sksec 306 security/selinux/netlabel.c sksec->nlbl_state = NLBL_LABELED; sksec 355 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 358 security/selinux/netlabel.c sksec->nlbl_state = NLBL_LABELED; sksec 360 security/selinux/netlabel.c sksec->nlbl_state = NLBL_UNSET; sksec 373 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 376 security/selinux/netlabel.c newsksec->nlbl_state = sksec->nlbl_state; sksec 392 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 404 security/selinux/netlabel.c sksec->nlbl_state = NLBL_LABELED; sksec 407 security/selinux/netlabel.c sksec->nlbl_state = NLBL_REQSKB; sksec 428 security/selinux/netlabel.c int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, sksec 452 security/selinux/netlabel.c switch (sksec->sclass) { sksec 464 security/selinux/netlabel.c sksec->sid, nlbl_sid, sksec->sclass, perm, ad); sksec 507 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 511 security/selinux/netlabel.c (sksec->nlbl_state == NLBL_LABELED || sksec 512 security/selinux/netlabel.c sksec->nlbl_state == NLBL_CONNLABELED)) { sksec 545 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 553 security/selinux/netlabel.c sksec->nlbl_state = NLBL_REQSKB; sksec 564 security/selinux/netlabel.c sksec->nlbl_state = NLBL_CONNLABELED; sksec 584 security/selinux/netlabel.c struct sk_security_struct *sksec = sk->sk_security; sksec 586 security/selinux/netlabel.c if (sksec->nlbl_state != NLBL_REQSKB && sksec 587 security/selinux/netlabel.c sksec->nlbl_state != NLBL_CONNLABELED)