Function report |
Source Code:security\selinux\hooks.c |
Create Date:2022-07-28 19:01:00 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Called whenever SCTP receives an INIT chunk. This happens when an incoming* connect(2), sctp_connectx(3) or sctp_sendmsg(3) (with no association* already present).
Proto:static int selinux_sctp_assoc_request(struct sctp_endpoint *ep, struct sk_buff *skb)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct sctp_endpoint * | ep | |
| struct sk_buff * | skb |
| 5203 | sksec = sk_security |
| 5205 | struct lsm_network_audit net = {0, } |
| 5207 | peer_sid = SECINITSID_UNLABELED |
| 5209 | err = 0 |
| 5211 | If Not selinux_policycap_extsockclass() Then Return 0 |
| 5214 | peerlbl_active = selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled* Description:* This function checks if NetLabel or labeled IPSEC is enabled |
| 5216 | If peerlbl_active Then |
| 5225 | If peer_sid == unspecified SID Then peer_sid = SECINITSID_UNLABELED |
| 5229 | If sctp_assoc_state == SCTP_ASSOC_UNSET Then |
| 5230 | sctp_assoc_state = SCTP_ASSOC_SET |
| 5237 | SID of peer = peer_sid |
| 5238 | Else if SID of peer != peer_sid Then |
| 5242 | type = LSM_AUDIT_DATA_NET |
| 5263 | peer_secid = peer_sid |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |