xfrm.h (67f83cbf081a70426ff667e8d14f94e13ed3bdca) | xfrm.h (3de4bab5b9f8848a0c16a4b1ffe0452f0d670237) |
---|---|
1/* 2 * SELinux support for the XFRM LSM hooks 3 * 4 * Author : Trent Jaeger, <jaegert@us.ibm.com> 5 * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com> 6 */ 7#ifndef _SELINUX_XFRM_H_ 8#define _SELINUX_XFRM_H_ --- 22 unchanged lines hidden (view full) --- 31 return SOCK_INODE(sk->sk_socket)->i_security; 32} 33 34#ifdef CONFIG_SECURITY_NETWORK_XFRM 35int selinux_xfrm_sock_rcv_skb(u32 sid, struct sk_buff *skb, 36 struct avc_audit_data *ad); 37int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, 38 struct avc_audit_data *ad, u8 proto); | 1/* 2 * SELinux support for the XFRM LSM hooks 3 * 4 * Author : Trent Jaeger, <jaegert@us.ibm.com> 5 * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com> 6 */ 7#ifndef _SELINUX_XFRM_H_ 8#define _SELINUX_XFRM_H_ --- 22 unchanged lines hidden (view full) --- 31 return SOCK_INODE(sk->sk_socket)->i_security; 32} 33 34#ifdef CONFIG_SECURITY_NETWORK_XFRM 35int selinux_xfrm_sock_rcv_skb(u32 sid, struct sk_buff *skb, 36 struct avc_audit_data *ad); 37int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, 38 struct avc_audit_data *ad, u8 proto); |
39u32 selinux_socket_getpeer_dgram(struct sk_buff *skb); | |
40int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall); 41#else 42static inline int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb, 43 struct avc_audit_data *ad) 44{ 45 return 0; 46} 47 48static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, 49 struct avc_audit_data *ad, u8 proto) 50{ 51 return 0; 52} 53 | 39int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall); 40#else 41static inline int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb, 42 struct avc_audit_data *ad) 43{ 44 return 0; 45} 46 47static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, 48 struct avc_audit_data *ad, u8 proto) 49{ 50 return 0; 51} 52 |
54static inline int selinux_socket_getpeer_dgram(struct sk_buff *skb) 55{ 56 return SECSID_NULL; 57} | |
58static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall) 59{ 60 *sid = SECSID_NULL; 61 return 0; 62} 63#endif 64 65static inline void selinux_skb_xfrm_sid(struct sk_buff *skb, u32 *sid) 66{ 67 int err = selinux_xfrm_decode_session(skb, sid, 0); 68 BUG_ON(err); 69} 70 71#endif /* _SELINUX_XFRM_H_ */ | 53static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall) 54{ 55 *sid = SECSID_NULL; 56 return 0; 57} 58#endif 59 60static inline void selinux_skb_xfrm_sid(struct sk_buff *skb, u32 *sid) 61{ 62 int err = selinux_xfrm_decode_session(skb, sid, 0); 63 BUG_ON(err); 64} 65 66#endif /* _SELINUX_XFRM_H_ */ |