xfrm.h 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. /*
  2. * SELinux support for the XFRM LSM hooks
  3. *
  4. * Author : Trent Jaeger, <jaegert@us.ibm.com>
  5. * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
  6. */
  7. #ifndef _SELINUX_XFRM_H_
  8. #define _SELINUX_XFRM_H_
  9. #include <net/flow.h>
  10. int selinux_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
  11. struct xfrm_user_sec_ctx *uctx,
  12. gfp_t gfp);
  13. int selinux_xfrm_policy_clone(struct xfrm_sec_ctx *old_ctx,
  14. struct xfrm_sec_ctx **new_ctxp);
  15. void selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx);
  16. int selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx);
  17. int selinux_xfrm_state_alloc(struct xfrm_state *x,
  18. struct xfrm_user_sec_ctx *uctx);
  19. int selinux_xfrm_state_alloc_acquire(struct xfrm_state *x,
  20. struct xfrm_sec_ctx *polsec, u32 secid);
  21. void selinux_xfrm_state_free(struct xfrm_state *x);
  22. int selinux_xfrm_state_delete(struct xfrm_state *x);
  23. int selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir);
  24. int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
  25. struct xfrm_policy *xp,
  26. const struct flowi *fl);
  27. #ifdef CONFIG_SECURITY_NETWORK_XFRM
  28. extern atomic_t selinux_xfrm_refcount;
  29. static inline int selinux_xfrm_enabled(void)
  30. {
  31. return (atomic_read(&selinux_xfrm_refcount) > 0);
  32. }
  33. int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
  34. struct common_audit_data *ad);
  35. int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
  36. struct common_audit_data *ad, u8 proto);
  37. int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
  38. int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
  39. static inline void selinux_xfrm_notify_policyload(void)
  40. {
  41. struct net *net;
  42. rtnl_lock();
  43. for_each_net(net) {
  44. atomic_inc(&net->xfrm.flow_cache_genid);
  45. rt_genid_bump_all(net);
  46. }
  47. rtnl_unlock();
  48. }
  49. #else
  50. static inline int selinux_xfrm_enabled(void)
  51. {
  52. return 0;
  53. }
  54. static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
  55. struct common_audit_data *ad)
  56. {
  57. return 0;
  58. }
  59. static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
  60. struct common_audit_data *ad,
  61. u8 proto)
  62. {
  63. return 0;
  64. }
  65. static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid,
  66. int ckall)
  67. {
  68. *sid = SECSID_NULL;
  69. return 0;
  70. }
  71. static inline void selinux_xfrm_notify_policyload(void)
  72. {
  73. }
  74. static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid)
  75. {
  76. *sid = SECSID_NULL;
  77. return 0;
  78. }
  79. #endif
  80. #endif /* _SELINUX_XFRM_H_ */