diff options
Diffstat (limited to 'security/selinux/xfrm.c')
| -rw-r--r-- | security/selinux/xfrm.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c index 72b18452e1a..fff78d3b51a 100644 --- a/security/selinux/xfrm.c +++ b/security/selinux/xfrm.c | |||
| @@ -38,6 +38,7 @@ | |||
| 38 | #include <linux/netfilter.h> | 38 | #include <linux/netfilter.h> |
| 39 | #include <linux/netfilter_ipv4.h> | 39 | #include <linux/netfilter_ipv4.h> |
| 40 | #include <linux/netfilter_ipv6.h> | 40 | #include <linux/netfilter_ipv6.h> |
| 41 | #include <linux/slab.h> | ||
| 41 | #include <linux/ip.h> | 42 | #include <linux/ip.h> |
| 42 | #include <linux/tcp.h> | 43 | #include <linux/tcp.h> |
| 43 | #include <linux/skbuff.h> | 44 | #include <linux/skbuff.h> |
| @@ -401,7 +402,7 @@ int selinux_xfrm_state_delete(struct xfrm_state *x) | |||
| 401 | * gone thru the IPSec process. | 402 | * gone thru the IPSec process. |
| 402 | */ | 403 | */ |
| 403 | int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb, | 404 | int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb, |
| 404 | struct avc_audit_data *ad) | 405 | struct common_audit_data *ad) |
| 405 | { | 406 | { |
| 406 | int i, rc = 0; | 407 | int i, rc = 0; |
| 407 | struct sec_path *sp; | 408 | struct sec_path *sp; |
| @@ -442,7 +443,7 @@ int selinux_xfrm_sock_rcv_skb(u32 isec_sid, struct sk_buff *skb, | |||
| 442 | * checked in the selinux_xfrm_state_pol_flow_match hook above. | 443 | * checked in the selinux_xfrm_state_pol_flow_match hook above. |
| 443 | */ | 444 | */ |
| 444 | int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, | 445 | int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb, |
| 445 | struct avc_audit_data *ad, u8 proto) | 446 | struct common_audit_data *ad, u8 proto) |
| 446 | { | 447 | { |
| 447 | struct dst_entry *dst; | 448 | struct dst_entry *dst; |
| 448 | int rc = 0; | 449 | int rc = 0; |
