Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:include\net\netlabel.h Create Date:2022-07-28 18:46:28
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:lbl_secattr_destroy - Clears a netlbl_lsm_secattr struct*@secattr: the struct to clear* Description:* Destroys the @secattr struct, including freeing all of the internal buffers.* The struct must be reset with a call to netlbl_secattr_init() before reuse.

Proto:static inline void netlbl_secattr_destroy(struct netlbl_lsm_secattr *secattr)

Type:void

Parameter:

TypeParameterName
struct netlbl_lsm_secattr *secattr
363  If flags & map meta-values for 'flags' Then kfree(domain)
365  If flags & NETLBL_SECATTR_CACHE Then lbl_secattr_cache_free - Frees a netlbl_lsm_cache struct*@cache: the struct to free* Description:* Frees @secattr including all of the internal buffers.
367  If flags & NETLBL_SECATTR_MLS_CAT Then lbl_catmap_free - Free a LSM secattr catmap*@catmap: the category bitmap* Description:* Free a LSM secattr catmap.
Caller
NameDescribe
selinux_netlbl_skbuff_getsidselinux_netlbl_skbuff_getsid - Get the sid of a packet using NetLabel*@skb: the packet*@family: protocol family*@type: NetLabel labeling protocol type*@sid: the SID* Description:* Call the NetLabel mechanism to get the security attributes of the given*
selinux_netlbl_skbuff_setsidselinux_netlbl_skbuff_setsid - Set the NetLabel on a packet given a sid*@skb: the packet*@family: protocol family*@sid: the SID* Description* Call the NetLabel mechanism to set the label of a packet using @sid.
selinux_netlbl_sctp_assoc_requestselinux_netlbl_sctp_assoc_request - Label an incoming sctp association.*@ep: incoming association endpoint.*@skb: the packet.* Description:* A new incoming connection is represented by @ep, ......* Returns zero on success, negative values on failure.
selinux_netlbl_inet_conn_requestselinux_netlbl_inet_conn_request - Label an incoming stream connection*@req: incoming connection request socket* Description:* A new incoming connection request is represented by @req, we need to label* the new request_sock here and the stack will ensure
selinux_netlbl_sock_rcv_skbselinux_netlbl_sock_rcv_skb - Do an inbound access check using NetLabel*@sksec: the sock's sk_security_struct*@skb: the packet*@family: protocol family*@ad: the audit data* Description:* Fetch the NetLabel security attributes from @skb and perform an
selinux_netlbl_socket_setsockoptselinux_netlbl_socket_setsockopt - Do not allow users to remove a NetLabel*@sock: the socket*@level: the socket level or protocol*@optname: the socket option name* Description:* Check the setsockopt() call and if the user is trying to replace the IP*
smack_socket_sock_rcv_skbsmack_socket_sock_rcv_skb - Smack packet delivery access check*@sk: socket*@skb: packet* Returns 0 if the packet should be delivered, an error code otherwise
smack_socket_getpeersec_dgramsmack_socket_getpeersec_dgram - pull in packet label*@sock: the peer socket*@skb: packet data*@secid: pointer to where to put the secid of the packet* Sets the netlabel socket state on sk from parent
smack_inet_conn_requestsmack_inet_conn_request - Smack access check on connect*@sk: socket involved*@skb: packet*@req: unused* Returns 0 if a task with the packet label could write to* the socket, otherwise an error code