Function report |
Source Code:security\selinux\hooks.c |
Create Date:2022-07-28 19:01:00 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Called whenever SCTP receives an INIT chunk. This happens when an incoming* connect(2), sctp_connectx(3) or sctp_sendmsg(3) (with no association* already present).
Proto:static int selinux_sctp_assoc_request(struct sctp_endpoint *ep, struct sk_buff *skb)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct sctp_endpoint * | ep | |
struct sk_buff * | skb |
5203 | sksec = sk_security |
5205 | struct lsm_network_audit net = {0, } |
5207 | peer_sid = SECINITSID_UNLABELED |
5209 | err = 0 |
5211 | If Not selinux_policycap_extsockclass() Then Return 0 |
5214 | peerlbl_active = selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled* Description:* This function checks if NetLabel or labeled IPSEC is enabled |
5216 | If peerlbl_active Then |
5225 | If peer_sid == unspecified SID Then peer_sid = SECINITSID_UNLABELED |
5229 | If sctp_assoc_state == SCTP_ASSOC_UNSET Then |
5230 | sctp_assoc_state = SCTP_ASSOC_SET |
5237 | SID of peer = peer_sid |
5238 | Else if SID of peer != peer_sid Then |
5242 | type = LSM_AUDIT_DATA_NET |
5263 | peer_secid = peer_sid |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |