Function report |
Source Code:security\selinux\hooks.c |
Create Date:2022-07-28 18:59:24 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:selinux_skb_peerlbl_sid - Determine the peer label of a packet*@skb: the packet*@family: protocol family*@sid: the packet's peer label SID* Description:* Check the various different forms of network peer labeling and determine* the peer label/SID for the
Proto:static int selinux_skb_peerlbl_sid(struct sk_buff *skb, u16 family, unsigned int *sid)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct sk_buff * | skb | |
u16 | family | |
unsigned int * | sid |
4430 | err = selinux_xfrm_skb_sid(skb, & xfrm_sid) |
4431 | If Value for the false possibility is greater at compile time(err) Then Return -EACCES |
4434 | If Value for the false possibility is greater at compile time(err) Then Return -EACCES |
4437 | err = security_net_peersid_resolve( & selinux_state, nlbl_sid, nlbl_type, xfrm_sid, sid) |
4440 | pr_warn("SELinux: failure in selinux_skb_peerlbl_sid(), unable to determine packet's peer label\n") |
4443 | Return -EACCES |
4446 | Return 0 |
Name | Describe |
---|---|
selinux_socket_sock_rcv_skb | |
selinux_socket_getpeersec_dgram | |
selinux_sctp_assoc_request | Called whenever SCTP receives an INIT chunk. This happens when an incoming* connect(2), sctp_connectx(3) or sctp_sendmsg(3) (with no association* already present). |
selinux_inet_conn_request | |
selinux_inet_conn_established |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |