root/security/selinux/include/xfrm.h

/* [<][>][^][v][top][bottom][index][help] */

INCLUDED FROM


DEFINITIONS

This source file includes following definitions.
  1. selinux_xfrm_enabled
  2. selinux_xfrm_notify_policyload
  3. selinux_xfrm_enabled
  4. selinux_xfrm_sock_rcv_skb
  5. selinux_xfrm_postroute_last
  6. selinux_xfrm_decode_session
  7. selinux_xfrm_notify_policyload
  8. selinux_xfrm_skb_sid

   1 /* SPDX-License-Identifier: GPL-2.0 */
   2 /*
   3  * SELinux support for the XFRM LSM hooks
   4  *
   5  * Author : Trent Jaeger, <jaegert@us.ibm.com>
   6  * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
   7  */
   8 #ifndef _SELINUX_XFRM_H_
   9 #define _SELINUX_XFRM_H_
  10 
  11 #include <net/flow.h>
  12 
  13 int selinux_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
  14                               struct xfrm_user_sec_ctx *uctx,
  15                               gfp_t gfp);
  16 int selinux_xfrm_policy_clone(struct xfrm_sec_ctx *old_ctx,
  17                               struct xfrm_sec_ctx **new_ctxp);
  18 void selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx);
  19 int selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx);
  20 int selinux_xfrm_state_alloc(struct xfrm_state *x,
  21                              struct xfrm_user_sec_ctx *uctx);
  22 int selinux_xfrm_state_alloc_acquire(struct xfrm_state *x,
  23                                      struct xfrm_sec_ctx *polsec, u32 secid);
  24 void selinux_xfrm_state_free(struct xfrm_state *x);
  25 int selinux_xfrm_state_delete(struct xfrm_state *x);
  26 int selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir);
  27 int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
  28                                       struct xfrm_policy *xp,
  29                                       const struct flowi *fl);
  30 
  31 #ifdef CONFIG_SECURITY_NETWORK_XFRM
  32 extern atomic_t selinux_xfrm_refcount;
  33 
  34 static inline int selinux_xfrm_enabled(void)
  35 {
  36         return (atomic_read(&selinux_xfrm_refcount) > 0);
  37 }
  38 
  39 int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
  40                               struct common_audit_data *ad);
  41 int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
  42                                 struct common_audit_data *ad, u8 proto);
  43 int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
  44 int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
  45 
  46 static inline void selinux_xfrm_notify_policyload(void)
  47 {
  48         struct net *net;
  49 
  50         down_read(&net_rwsem);
  51         for_each_net(net)
  52                 rt_genid_bump_all(net);
  53         up_read(&net_rwsem);
  54 }
  55 #else
  56 static inline int selinux_xfrm_enabled(void)
  57 {
  58         return 0;
  59 }
  60 
  61 static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
  62                                             struct common_audit_data *ad)
  63 {
  64         return 0;
  65 }
  66 
  67 static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
  68                                               struct common_audit_data *ad,
  69                                               u8 proto)
  70 {
  71         return 0;
  72 }
  73 
  74 static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid,
  75                                               int ckall)
  76 {
  77         *sid = SECSID_NULL;
  78         return 0;
  79 }
  80 
  81 static inline void selinux_xfrm_notify_policyload(void)
  82 {
  83 }
  84 
  85 static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid)
  86 {
  87         *sid = SECSID_NULL;
  88         return 0;
  89 }
  90 #endif
  91 
  92 #endif /* _SELINUX_XFRM_H_ */

/* [<][>][^][v][top][bottom][index][help] */