Function report |
Source Code:security\selinux\hooks.c |
Create Date:2022-07-28 19:00:38 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:selinux_socket_sock_rcv_skb
Proto:static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct sock * | sk | |
| struct sk_buff * | skb |
| 5003 | sksec = sk_security |
| 5005 | sk_sid = SID of this object |
| 5007 | struct lsm_network_audit net = {0, } |
| 5023 | If Not selinux_policycap_netpeer() Then Return selinux_sock_rcv_skb_compat(sk, skb, family) |
| 5027 | peerlbl_active = selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled* Description:* This function checks if NetLabel or labeled IPSEC is enabled |
| 5028 | If Not secmark_active && Not peerlbl_active Then Return 0 |
| 5031 | type = LSM_AUDIT_DATA_NET |
| 5035 | err = selinux_parse_skb(skb, & ad, & addrp, 1, NULL) |
| 5039 | If peerlbl_active Then |
| 5047 | If err Then |
| 5048 | selinux_netlbl_err(skb, family, err, 0) |
| 5049 | Return err |
| 5054 | If err Then |
| 5055 | selinux_netlbl_err(skb, family, err, 0) |
| 5056 | Return err |
| 5060 | If secmark_active Then |
| 5068 | Return err |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |