1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192 |
- /*
- * SELinux support for the XFRM LSM hooks
- *
- * Author : Trent Jaeger, <jaegert@us.ibm.com>
- * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
- */
- #ifndef _SELINUX_XFRM_H_
- #define _SELINUX_XFRM_H_
- #include <net/flow.h>
- int selinux_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
- struct xfrm_user_sec_ctx *sec_ctx);
- int selinux_xfrm_policy_clone(struct xfrm_sec_ctx *old_ctx,
- struct xfrm_sec_ctx **new_ctxp);
- void selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx);
- int selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx);
- int selinux_xfrm_state_alloc(struct xfrm_state *x,
- struct xfrm_user_sec_ctx *sec_ctx, u32 secid);
- void selinux_xfrm_state_free(struct xfrm_state *x);
- int selinux_xfrm_state_delete(struct xfrm_state *x);
- int selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir);
- int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
- struct xfrm_policy *xp, const struct flowi *fl);
- /*
- * Extract the security blob from the sock (it's actually on the socket)
- */
- static inline struct inode_security_struct *get_sock_isec(struct sock *sk)
- {
- if (!sk->sk_socket)
- return NULL;
- return SOCK_INODE(sk->sk_socket)->i_security;
- }
- #ifdef CONFIG_SECURITY_NETWORK_XFRM
- extern atomic_t selinux_xfrm_refcount;
- static inline int selinux_xfrm_enabled(void)
- {
- return (atomic_read(&selinux_xfrm_refcount) > 0);
- }
- int selinux_xfrm_sock_rcv_skb(u32 sid, struct sk_buff *skb,
- struct common_audit_data *ad);
- int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
- struct common_audit_data *ad, u8 proto);
- int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
- int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
- static inline void selinux_xfrm_notify_policyload(void)
- {
- atomic_inc(&flow_cache_genid);
- }
- #else
- static inline int selinux_xfrm_enabled(void)
- {
- return 0;
- }
- static inline int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb,
- struct common_audit_data *ad)
- {
- return 0;
- }
- static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
- struct common_audit_data *ad, u8 proto)
- {
- return 0;
- }
- static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall)
- {
- *sid = SECSID_NULL;
- return 0;
- }
- static inline void selinux_xfrm_notify_policyload(void)
- {
- }
- static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid)
- {
- *sid = SECSID_NULL;
- return 0;
- }
- #endif
- #endif /* _SELINUX_XFRM_H_ */
|