xfrm.h (67f83cbf081a70426ff667e8d14f94e13ed3bdca) xfrm.h (3de4bab5b9f8848a0c16a4b1ffe0452f0d670237)
1/*
2 * SELinux support for the XFRM LSM hooks
3 *
4 * Author : Trent Jaeger, <jaegert@us.ibm.com>
5 * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
6 */
7#ifndef _SELINUX_XFRM_H_
8#define _SELINUX_XFRM_H_

--- 22 unchanged lines hidden (view full) ---

31 return SOCK_INODE(sk->sk_socket)->i_security;
32}
33
34#ifdef CONFIG_SECURITY_NETWORK_XFRM
35int selinux_xfrm_sock_rcv_skb(u32 sid, struct sk_buff *skb,
36 struct avc_audit_data *ad);
37int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
38 struct avc_audit_data *ad, u8 proto);
1/*
2 * SELinux support for the XFRM LSM hooks
3 *
4 * Author : Trent Jaeger, <jaegert@us.ibm.com>
5 * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
6 */
7#ifndef _SELINUX_XFRM_H_
8#define _SELINUX_XFRM_H_

--- 22 unchanged lines hidden (view full) ---

31 return SOCK_INODE(sk->sk_socket)->i_security;
32}
33
34#ifdef CONFIG_SECURITY_NETWORK_XFRM
35int selinux_xfrm_sock_rcv_skb(u32 sid, struct sk_buff *skb,
36 struct avc_audit_data *ad);
37int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
38 struct avc_audit_data *ad, u8 proto);
39u32 selinux_socket_getpeer_dgram(struct sk_buff *skb);
40int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
41#else
42static inline int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb,
43 struct avc_audit_data *ad)
44{
45 return 0;
46}
47
48static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
49 struct avc_audit_data *ad, u8 proto)
50{
51 return 0;
52}
53
39int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
40#else
41static inline int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb,
42 struct avc_audit_data *ad)
43{
44 return 0;
45}
46
47static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb,
48 struct avc_audit_data *ad, u8 proto)
49{
50 return 0;
51}
52
54static inline int selinux_socket_getpeer_dgram(struct sk_buff *skb)
55{
56 return SECSID_NULL;
57}
58static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall)
59{
60 *sid = SECSID_NULL;
61 return 0;
62}
63#endif
64
65static inline void selinux_skb_xfrm_sid(struct sk_buff *skb, u32 *sid)
66{
67 int err = selinux_xfrm_decode_session(skb, sid, 0);
68 BUG_ON(err);
69}
70
71#endif /* _SELINUX_XFRM_H_ */
53static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall)
54{
55 *sid = SECSID_NULL;
56 return 0;
57}
58#endif
59
60static inline void selinux_skb_xfrm_sid(struct sk_buff *skb, u32 *sid)
61{
62 int err = selinux_xfrm_decode_session(skb, sid, 0);
63 BUG_ON(err);
64}
65
66#endif /* _SELINUX_XFRM_H_ */