sksec            4482 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            4486 security/selinux/hooks.c 	if (sksec->sid == SECINITSID_KERNEL)
sksec            4494 security/selinux/hooks.c 			    current_sid(), sksec->sid, sksec->sclass, perms,
sksec            4523 security/selinux/hooks.c 	struct sk_security_struct *sksec;
sksec            4539 security/selinux/hooks.c 		sksec = sock->sk->sk_security;
sksec            4540 security/selinux/hooks.c 		sksec->sclass = sclass;
sksec            4541 security/selinux/hooks.c 		sksec->sid = sid;
sksec            4543 security/selinux/hooks.c 		if (sksec->sclass == SECCLASS_SCTP_SOCKET)
sksec            4544 security/selinux/hooks.c 			sksec->sctp_assoc_state = SCTP_ASSOC_UNSET;
sksec            4571 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            4645 security/selinux/hooks.c 						   sksec->sid, sid,
sksec            4646 security/selinux/hooks.c 						   sksec->sclass,
sksec            4653 security/selinux/hooks.c 		switch (sksec->sclass) {
sksec            4685 security/selinux/hooks.c 				   sksec->sid, sid,
sksec            4686 security/selinux/hooks.c 				   sksec->sclass, node_perm, &ad);
sksec            4694 security/selinux/hooks.c 	if (sksec->sclass == SECCLASS_SCTP_SOCKET)
sksec            4706 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            4725 security/selinux/hooks.c 	if (sksec->sclass == SECCLASS_TCP_SOCKET ||
sksec            4726 security/selinux/hooks.c 	    sksec->sclass == SECCLASS_DCCP_SOCKET ||
sksec            4727 security/selinux/hooks.c 	    sksec->sclass == SECCLASS_SCTP_SOCKET) {
sksec            4757 security/selinux/hooks.c 			if (sksec->sclass == SECCLASS_SCTP_SOCKET)
sksec            4767 security/selinux/hooks.c 		switch (sksec->sclass) {
sksec            4784 security/selinux/hooks.c 				   sksec->sid, sid, sksec->sclass, perm, &ad);
sksec            4962 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            4963 security/selinux/hooks.c 	u32 sk_sid = sksec->sid;
sksec            4984 security/selinux/hooks.c 	err = selinux_netlbl_sock_rcv_skb(sksec, skb, family, &ad);
sksec            4987 security/selinux/hooks.c 	err = selinux_xfrm_sock_rcv_skb(sksec->sid, skb, &ad);
sksec            4995 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            4997 security/selinux/hooks.c 	u32 sk_sid = sksec->sid;
sksec            5069 security/selinux/hooks.c 	struct sk_security_struct *sksec = sock->sk->sk_security;
sksec            5072 security/selinux/hooks.c 	if (sksec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
sksec            5073 security/selinux/hooks.c 	    sksec->sclass == SECCLASS_TCP_SOCKET ||
sksec            5074 security/selinux/hooks.c 	    sksec->sclass == SECCLASS_SCTP_SOCKET)
sksec            5075 security/selinux/hooks.c 		peer_sid = sksec->peer_sid;
sksec            5129 security/selinux/hooks.c 	struct sk_security_struct *sksec;
sksec            5131 security/selinux/hooks.c 	sksec = kzalloc(sizeof(*sksec), priority);
sksec            5132 security/selinux/hooks.c 	if (!sksec)
sksec            5135 security/selinux/hooks.c 	sksec->peer_sid = SECINITSID_UNLABELED;
sksec            5136 security/selinux/hooks.c 	sksec->sid = SECINITSID_UNLABELED;
sksec            5137 security/selinux/hooks.c 	sksec->sclass = SECCLASS_SOCKET;
sksec            5138 security/selinux/hooks.c 	selinux_netlbl_sk_security_reset(sksec);
sksec            5139 security/selinux/hooks.c 	sk->sk_security = sksec;
sksec            5146 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5149 security/selinux/hooks.c 	selinux_netlbl_sk_security_free(sksec);
sksec            5150 security/selinux/hooks.c 	kfree(sksec);
sksec            5155 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5158 security/selinux/hooks.c 	newsksec->sid = sksec->sid;
sksec            5159 security/selinux/hooks.c 	newsksec->peer_sid = sksec->peer_sid;
sksec            5160 security/selinux/hooks.c 	newsksec->sclass = sksec->sclass;
sksec            5170 security/selinux/hooks.c 		struct sk_security_struct *sksec = sk->sk_security;
sksec            5172 security/selinux/hooks.c 		*secid = sksec->sid;
sksec            5180 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5184 security/selinux/hooks.c 		isec->sid = sksec->sid;
sksec            5185 security/selinux/hooks.c 	sksec->sclass = isec->sclass;
sksec            5195 security/selinux/hooks.c 	struct sk_security_struct *sksec = ep->base.sk->sk_security;
sksec            5221 security/selinux/hooks.c 	if (sksec->sctp_assoc_state == SCTP_ASSOC_UNSET) {
sksec            5222 security/selinux/hooks.c 		sksec->sctp_assoc_state = SCTP_ASSOC_SET;
sksec            5229 security/selinux/hooks.c 		sksec->peer_sid = peer_sid;
sksec            5230 security/selinux/hooks.c 	} else if  (sksec->peer_sid != peer_sid) {
sksec            5238 security/selinux/hooks.c 				   sksec->peer_sid, peer_sid, sksec->sclass,
sksec            5250 security/selinux/hooks.c 	err = selinux_conn_sid(sksec->sid, peer_sid, &conn_sid);
sksec            5346 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5357 security/selinux/hooks.c 	newsksec->sclass = sksec->sclass;
sksec            5364 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5373 security/selinux/hooks.c 	err = selinux_conn_sid(sksec->sid, peersid, &connsid);
sksec            5402 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5408 security/selinux/hooks.c 	selinux_skb_peerlbl_sid(skb, family, &sksec->peer_sid);
sksec            5486 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5495 security/selinux/hooks.c 	sksec->sid = tunsec->sid;
sksec            5496 security/selinux/hooks.c 	sksec->sclass = SECCLASS_TUN_SOCKET;
sksec            5529 security/selinux/hooks.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec            5530 security/selinux/hooks.c 	u16 sclass = sksec->sclass;
sksec            5670 security/selinux/hooks.c 		struct sk_security_struct *sksec;
sksec            5688 security/selinux/hooks.c 		sksec = sk->sk_security;
sksec            5689 security/selinux/hooks.c 		sid = sksec->sid;
sksec            5719 security/selinux/hooks.c 	struct sk_security_struct *sksec;
sksec            5727 security/selinux/hooks.c 	sksec = sk->sk_security;
sksec            5738 security/selinux/hooks.c 				 sksec->sid, skb->secmark,
sksec            5742 security/selinux/hooks.c 	if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
sksec            5817 security/selinux/hooks.c 		struct sk_security_struct *sksec;
sksec            5819 security/selinux/hooks.c 		sksec = sk->sk_security;
sksec            5842 security/selinux/hooks.c 		if (selinux_conn_sid(sksec->sid, skb_sid, &peer_sid))
sksec            5848 security/selinux/hooks.c 		struct sk_security_struct *sksec = sk->sk_security;
sksec            5849 security/selinux/hooks.c 		peer_sid = sksec->sid;
sksec              32 security/selinux/include/netlabel.h void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec);
sksec              33 security/selinux/include/netlabel.h void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec);
sksec              48 security/selinux/include/netlabel.h int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
sksec              74 security/selinux/include/netlabel.h 					       struct sk_security_struct *sksec)
sksec              80 security/selinux/include/netlabel.h 					       struct sk_security_struct *sksec)
sksec             131 security/selinux/include/netlabel.h static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
sksec              70 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec              73 security/selinux/netlabel.c 	if (sksec->nlbl_secattr != NULL)
sksec              74 security/selinux/netlabel.c 		return sksec->nlbl_secattr;
sksec              79 security/selinux/netlabel.c 	rc = security_netlbl_sid_to_secattr(&selinux_state, sksec->sid,
sksec              85 security/selinux/netlabel.c 	sksec->nlbl_secattr = secattr;
sksec             103 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             104 security/selinux/netlabel.c 	struct netlbl_lsm_secattr *secattr = sksec->nlbl_secattr;
sksec             154 security/selinux/netlabel.c void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec)
sksec             156 security/selinux/netlabel.c 	if (sksec->nlbl_secattr != NULL)
sksec             157 security/selinux/netlabel.c 		netlbl_secattr_free(sksec->nlbl_secattr);
sksec             170 security/selinux/netlabel.c void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec)
sksec             172 security/selinux/netlabel.c 	sksec->nlbl_state = NLBL_UNSET;
sksec             238 security/selinux/netlabel.c 		struct sk_security_struct *sksec = sk->sk_security;
sksec             240 security/selinux/netlabel.c 		if (sksec->nlbl_state != NLBL_REQSKB)
sksec             276 security/selinux/netlabel.c 	struct sk_security_struct *sksec = ep->base.sk->sk_security;
sksec             306 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_LABELED;
sksec             355 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             358 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_LABELED;
sksec             360 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_UNSET;
sksec             373 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             376 security/selinux/netlabel.c 	newsksec->nlbl_state = sksec->nlbl_state;
sksec             392 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             404 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_LABELED;
sksec             407 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_REQSKB;
sksec             428 security/selinux/netlabel.c int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
sksec             452 security/selinux/netlabel.c 	switch (sksec->sclass) {
sksec             464 security/selinux/netlabel.c 			  sksec->sid, nlbl_sid, sksec->sclass, perm, ad);
sksec             507 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             511 security/selinux/netlabel.c 	    (sksec->nlbl_state == NLBL_LABELED ||
sksec             512 security/selinux/netlabel.c 	     sksec->nlbl_state == NLBL_CONNLABELED)) {
sksec             545 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             553 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_REQSKB;
sksec             564 security/selinux/netlabel.c 		sksec->nlbl_state = NLBL_CONNLABELED;
sksec             584 security/selinux/netlabel.c 	struct sk_security_struct *sksec = sk->sk_security;
sksec             586 security/selinux/netlabel.c 	if (sksec->nlbl_state != NLBL_REQSKB &&
sksec             587 security/selinux/netlabel.c 	    sksec->nlbl_state != NLBL_CONNLABELED)