]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - security/selinux/include/xfrm.h
Merge remote-tracking branches 'spi/topic/s3c64xx', 'spi/topic/sc18is602', 'spi/topic...
[mirror_ubuntu-jammy-kernel.git] / security / selinux / include / xfrm.h
CommitLineData
d28d1e08
TJ
1/*
2 * SELinux support for the XFRM LSM hooks
3 *
4 * Author : Trent Jaeger, <jaegert@us.ibm.com>
e0d1caa7 5 * Updated : Venkat Yekkirala, <vyekkirala@TrustedCS.com>
d28d1e08
TJ
6 */
7#ifndef _SELINUX_XFRM_H_
8#define _SELINUX_XFRM_H_
9
778aae84
DH
10#include <net/flow.h>
11
03e1ad7b 12int selinux_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
52a4c640
NA
13 struct xfrm_user_sec_ctx *uctx,
14 gfp_t gfp);
03e1ad7b
PM
15int selinux_xfrm_policy_clone(struct xfrm_sec_ctx *old_ctx,
16 struct xfrm_sec_ctx **new_ctxp);
17void selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx);
18int selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx);
e0d1caa7 19int selinux_xfrm_state_alloc(struct xfrm_state *x,
2e5aa866
PM
20 struct xfrm_user_sec_ctx *uctx);
21int selinux_xfrm_state_alloc_acquire(struct xfrm_state *x,
22 struct xfrm_sec_ctx *polsec, u32 secid);
d28d1e08 23void selinux_xfrm_state_free(struct xfrm_state *x);
c8c05a8e 24int selinux_xfrm_state_delete(struct xfrm_state *x);
03e1ad7b 25int selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir);
e0d1caa7 26int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
d1b17b09
PM
27 struct xfrm_policy *xp,
28 const struct flowi *fl);
d28d1e08 29
d28d1e08 30#ifdef CONFIG_SECURITY_NETWORK_XFRM
d621d35e
PM
31extern atomic_t selinux_xfrm_refcount;
32
33static inline int selinux_xfrm_enabled(void)
34{
35 return (atomic_read(&selinux_xfrm_refcount) > 0);
36}
37
eef9b416
PM
38int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
39 struct common_audit_data *ad);
40int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
41 struct common_audit_data *ad, u8 proto);
a51c64f1 42int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid, int ckall);
817eff71 43int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid);
342a0cff
VY
44
45static inline void selinux_xfrm_notify_policyload(void)
46{
ca4c3fc2 47 struct net *net;
48
342a0cff 49 atomic_inc(&flow_cache_genid);
ca4c3fc2 50 rtnl_lock();
51 for_each_net(net)
52 rt_genid_bump_all(net);
53 rtnl_unlock();
342a0cff 54}
d28d1e08 55#else
d621d35e
PM
56static inline int selinux_xfrm_enabled(void)
57{
58 return 0;
59}
60
eef9b416
PM
61static inline int selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb,
62 struct common_audit_data *ad)
d28d1e08
TJ
63{
64 return 0;
65}
66
eef9b416
PM
67static inline int selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb,
68 struct common_audit_data *ad,
69 u8 proto)
d28d1e08 70{
4e5ab4cb 71 return 0;
d28d1e08 72}
e6f50719 73
d1b17b09
PM
74static inline int selinux_xfrm_decode_session(struct sk_buff *skb, u32 *sid,
75 int ckall)
a51c64f1
VY
76{
77 *sid = SECSID_NULL;
78 return 0;
79}
342a0cff
VY
80
81static inline void selinux_xfrm_notify_policyload(void)
82{
83}
d28d1e08 84
817eff71 85static inline int selinux_xfrm_skb_sid(struct sk_buff *skb, u32 *sid)
6b877699 86{
817eff71
PM
87 *sid = SECSID_NULL;
88 return 0;
6b877699 89}
817eff71 90#endif
6b877699 91
d28d1e08 92#endif /* _SELINUX_XFRM_H_ */