/dports/multimedia/v4l_compat/linux-5.13-rc2/net/netfilter/ |
H A D | xt_CONNSECMARK.c | 34 if (skb->secmark) { in secmark_save() 39 if (ct && !ct->secmark) { in secmark_save() 40 ct->secmark = skb->secmark; in secmark_save() 52 if (!skb->secmark) { in secmark_restore() 57 if (ct && ct->secmark) in secmark_restore() 58 skb->secmark = ct->secmark; in secmark_restore()
|
H A D | xt_SECMARK.c | 29 u32 secmark = 0; in secmark_tg() local 33 secmark = info->secid; in secmark_tg() 39 skb->secmark = secmark; in secmark_tg()
|
H A D | nft_meta.c | 366 *dest = skb->secmark; in nft_meta_get_eval() 454 skb->secmark = value; in nft_meta_set_eval() 836 skb->secmark = priv->secid; in nft_secmark_obj_eval()
|
/dports/multimedia/libv4l/linux-5.13-rc2/net/netfilter/ |
H A D | xt_CONNSECMARK.c | 34 if (skb->secmark) { in secmark_save() 39 if (ct && !ct->secmark) { in secmark_save() 40 ct->secmark = skb->secmark; in secmark_save() 52 if (!skb->secmark) { in secmark_restore() 57 if (ct && ct->secmark) in secmark_restore() 58 skb->secmark = ct->secmark; in secmark_restore()
|
H A D | xt_SECMARK.c | 29 u32 secmark = 0; in secmark_tg() local 33 secmark = info->secid; in secmark_tg() 39 skb->secmark = secmark; in secmark_tg()
|
H A D | nft_meta.c | 366 *dest = skb->secmark; in nft_meta_get_eval() 454 skb->secmark = value; in nft_meta_set_eval() 836 skb->secmark = priv->secid; in nft_secmark_obj_eval()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/net/netfilter/ |
H A D | xt_CONNSECMARK.c | 34 if (skb->secmark) { in secmark_save() 39 if (ct && !ct->secmark) { in secmark_save() 40 ct->secmark = skb->secmark; in secmark_save() 52 if (!skb->secmark) { in secmark_restore() 57 if (ct && ct->secmark) in secmark_restore() 58 skb->secmark = ct->secmark; in secmark_restore()
|
H A D | xt_SECMARK.c | 29 u32 secmark = 0; in secmark_tg() local 33 secmark = info->secid; in secmark_tg() 39 skb->secmark = secmark; in secmark_tg()
|
H A D | nft_meta.c | 366 *dest = skb->secmark; in nft_meta_get_eval() 454 skb->secmark = value; in nft_meta_set_eval() 836 skb->secmark = priv->secid; in nft_secmark_obj_eval()
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/apparmor/ |
H A D | net.c | 192 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument 196 if (secmark->label[0] == '*') { in apparmor_secmark_init() 197 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 202 secmark->label, strlen(secmark->label), in apparmor_secmark_init() 208 secmark->secid = label->secid; in apparmor_secmark_init() 223 if (!profile->secmark[i].secid) { in aa_secmark_perm() 224 ret = apparmor_secmark_init(&profile->secmark[i]); in aa_secmark_perm() 229 if (profile->secmark[i].secid == secid || in aa_secmark_perm() 230 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 231 if (profile->secmark[i].deny) in aa_secmark_perm() [all …]
|
H A D | policy_unpack.c | 583 profile->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 585 if (!profile->secmark) in unpack_secmark() 591 if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) in unpack_secmark() 593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark() 595 if (!unpack_strdup(e, &profile->secmark[i].label, NULL)) in unpack_secmark() 607 if (profile->secmark) { in unpack_secmark() 609 kfree(profile->secmark[i].label); in unpack_secmark() 610 kfree(profile->secmark); in unpack_secmark() 612 profile->secmark = NULL; in unpack_secmark()
|
H A D | lsm.c | 1057 if (!skb->secmark) in apparmor_socket_sock_rcv_skb() 1061 skb->secmark, sk); in apparmor_socket_sock_rcv_skb() 1164 if (!skb->secmark) in apparmor_inet_conn_request() 1168 skb->secmark, sk); in apparmor_inet_conn_request() 1760 if (!skb->secmark) in apparmor_ip_postroute() 1769 skb->secmark, sk)) in apparmor_ip_postroute()
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/apparmor/ |
H A D | net.c | 192 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument 196 if (secmark->label[0] == '*') { in apparmor_secmark_init() 197 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 202 secmark->label, strlen(secmark->label), in apparmor_secmark_init() 208 secmark->secid = label->secid; in apparmor_secmark_init() 223 if (!profile->secmark[i].secid) { in aa_secmark_perm() 224 ret = apparmor_secmark_init(&profile->secmark[i]); in aa_secmark_perm() 229 if (profile->secmark[i].secid == secid || in aa_secmark_perm() 230 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 231 if (profile->secmark[i].deny) in aa_secmark_perm() [all …]
|
H A D | policy_unpack.c | 583 profile->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 585 if (!profile->secmark) in unpack_secmark() 591 if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) in unpack_secmark() 593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark() 595 if (!unpack_strdup(e, &profile->secmark[i].label, NULL)) in unpack_secmark() 607 if (profile->secmark) { in unpack_secmark() 609 kfree(profile->secmark[i].label); in unpack_secmark() 610 kfree(profile->secmark); in unpack_secmark() 612 profile->secmark = NULL; in unpack_secmark()
|
H A D | lsm.c | 1057 if (!skb->secmark) in apparmor_socket_sock_rcv_skb() 1061 skb->secmark, sk); in apparmor_socket_sock_rcv_skb() 1164 if (!skb->secmark) in apparmor_inet_conn_request() 1168 skb->secmark, sk); in apparmor_inet_conn_request() 1760 if (!skb->secmark) in apparmor_ip_postroute() 1769 skb->secmark, sk)) in apparmor_ip_postroute()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/apparmor/ |
H A D | net.c | 192 static int apparmor_secmark_init(struct aa_secmark *secmark) in apparmor_secmark_init() argument 196 if (secmark->label[0] == '*') { in apparmor_secmark_init() 197 secmark->secid = AA_SECID_WILDCARD; in apparmor_secmark_init() 202 secmark->label, strlen(secmark->label), in apparmor_secmark_init() 208 secmark->secid = label->secid; in apparmor_secmark_init() 223 if (!profile->secmark[i].secid) { in aa_secmark_perm() 224 ret = apparmor_secmark_init(&profile->secmark[i]); in aa_secmark_perm() 229 if (profile->secmark[i].secid == secid || in aa_secmark_perm() 230 profile->secmark[i].secid == AA_SECID_WILDCARD) { in aa_secmark_perm() 231 if (profile->secmark[i].deny) in aa_secmark_perm() [all …]
|
H A D | policy_unpack.c | 583 profile->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 585 if (!profile->secmark) in unpack_secmark() 591 if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) in unpack_secmark() 593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark() 595 if (!unpack_strdup(e, &profile->secmark[i].label, NULL)) in unpack_secmark() 607 if (profile->secmark) { in unpack_secmark() 609 kfree(profile->secmark[i].label); in unpack_secmark() 610 kfree(profile->secmark); in unpack_secmark() 612 profile->secmark = NULL; in unpack_secmark()
|
H A D | lsm.c | 1057 if (!skb->secmark) in apparmor_socket_sock_rcv_skb() 1061 skb->secmark, sk); in apparmor_socket_sock_rcv_skb() 1164 if (!skb->secmark) in apparmor_inet_conn_request() 1168 skb->secmark, sk); in apparmor_inet_conn_request() 1760 if (!skb->secmark) in apparmor_ip_postroute() 1769 skb->secmark, sk)) in apparmor_ip_postroute()
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/smack/ |
H A D | smack_netfilter.c | 34 skb->secmark = skp->smk_secid; in smack_ipv6_output() 52 skb->secmark = skp->smk_secid; in smack_ipv4_output()
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/smack/ |
H A D | smack_netfilter.c | 34 skb->secmark = skp->smk_secid; in smack_ipv6_output() 52 skb->secmark = skp->smk_secid; in smack_ipv4_output()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/smack/ |
H A D | smack_netfilter.c | 34 skb->secmark = skp->smk_secid; in smack_ipv6_output() 52 skb->secmark = skp->smk_secid; in smack_ipv4_output()
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/apparmor/include/ |
H A D | policy.h | 155 struct aa_secmark *secmark; member
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/apparmor/include/ |
H A D | policy.h | 155 struct aa_secmark *secmark; member
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/apparmor/include/ |
H A D | policy.h | 155 struct aa_secmark *secmark; member
|
/dports/multimedia/libv4l/linux-5.13-rc2/include/net/netfilter/ |
H A D | nf_conntrack.h | 114 u_int32_t secmark; member
|