Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\selinux\hooks.c Create Date:2022-07-28 18:59:24
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:selinux_skb_peerlbl_sid - Determine the peer label of a packet*@skb: the packet*@family: protocol family*@sid: the packet's peer label SID* Description:* Check the various different forms of network peer labeling and determine* the peer label/SID for the

Proto:static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, unsigned int *sid)

Type:int

Parameter:

TypeParameterName
struct sk_buff *skb
u16family
unsigned int *sid
4430  err = selinux_xfrm_skb_sid(skb, & xfrm_sid)
4431  If Value for the false possibility is greater at compile time(err) Then Return -EACCES
4433  err = selinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel*@skb: the packet*@family: protocol family*@type: NetLabel labeling protocol type*@sid: the SID* Description:* Call the NetLabel mechanism to get the security attributes of the given*
4434  If Value for the false possibility is greater at compile time(err) Then Return -EACCES
4437  err = security_net_peersid_resolve( & selinux_state, nlbl_sid, nlbl_type, xfrm_sid, sid)
4439  If Value for the false possibility is greater at compile time(err) Then
4440  pr_warn("SELinux: failure in selinux_skb_peerlbl_sid(), unable to determine packet's peer label\n")
4443  Return -EACCES
4446  Return 0
Caller
NameDescribe
selinux_socket_sock_rcv_skb
selinux_socket_getpeersec_dgram
selinux_sctp_assoc_requestCalled whenever SCTP receives an INIT chunk. This happens when an incoming* connect(2), sctp_connectx(3) or sctp_sendmsg(3) (with no association* already present).
selinux_inet_conn_request
selinux_inet_conn_established