diff options
Diffstat (limited to 'include/linux/security.h')
| -rw-r--r-- | include/linux/security.h | 24 |
1 files changed, 9 insertions, 15 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 9b5fea81f55e..b200b9856f32 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
| @@ -882,7 +882,8 @@ struct request_sock; | |||
| 882 | * Check permission when a flow selects a xfrm_policy for processing | 882 | * Check permission when a flow selects a xfrm_policy for processing |
| 883 | * XFRMs on a packet. The hook is called when selecting either a | 883 | * XFRMs on a packet. The hook is called when selecting either a |
| 884 | * per-socket policy or a generic xfrm policy. | 884 | * per-socket policy or a generic xfrm policy. |
| 885 | * Return 0 if permission is granted. | 885 | * Return 0 if permission is granted, -ESRCH otherwise, or -errno |
| 886 | * on other errors. | ||
| 886 | * @xfrm_state_pol_flow_match: | 887 | * @xfrm_state_pol_flow_match: |
| 887 | * @x contains the state to match. | 888 | * @x contains the state to match. |
| 888 | * @xp contains the policy to check for a match. | 889 | * @xp contains the policy to check for a match. |
| @@ -891,6 +892,7 @@ struct request_sock; | |||
| 891 | * @xfrm_flow_state_match: | 892 | * @xfrm_flow_state_match: |
| 892 | * @fl contains the flow key to match. | 893 | * @fl contains the flow key to match. |
| 893 | * @xfrm points to the xfrm_state to match. | 894 | * @xfrm points to the xfrm_state to match. |
| 895 | * @xp points to the xfrm_policy to match. | ||
| 894 | * Return 1 if there is a match. | 896 | * Return 1 if there is a match. |
| 895 | * @xfrm_decode_session: | 897 | * @xfrm_decode_session: |
| 896 | * @skb points to skb to decode. | 898 | * @skb points to skb to decode. |
| @@ -1388,7 +1390,8 @@ struct security_operations { | |||
| 1388 | int (*xfrm_policy_lookup)(struct xfrm_policy *xp, u32 fl_secid, u8 dir); | 1390 | int (*xfrm_policy_lookup)(struct xfrm_policy *xp, u32 fl_secid, u8 dir); |
| 1389 | int (*xfrm_state_pol_flow_match)(struct xfrm_state *x, | 1391 | int (*xfrm_state_pol_flow_match)(struct xfrm_state *x, |
| 1390 | struct xfrm_policy *xp, struct flowi *fl); | 1392 | struct xfrm_policy *xp, struct flowi *fl); |
| 1391 | int (*xfrm_flow_state_match)(struct flowi *fl, struct xfrm_state *xfrm); | 1393 | int (*xfrm_flow_state_match)(struct flowi *fl, struct xfrm_state *xfrm, |
| 1394 | struct xfrm_policy *xp); | ||
| 1392 | int (*xfrm_decode_session)(struct sk_buff *skb, u32 *secid, int ckall); | 1395 | int (*xfrm_decode_session)(struct sk_buff *skb, u32 *secid, int ckall); |
| 1393 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ | 1396 | #endif /* CONFIG_SECURITY_NETWORK_XFRM */ |
| 1394 | 1397 | ||
| @@ -3120,11 +3123,6 @@ static inline int security_xfrm_policy_alloc(struct xfrm_policy *xp, struct xfrm | |||
| 3120 | return security_ops->xfrm_policy_alloc_security(xp, sec_ctx, NULL); | 3123 | return security_ops->xfrm_policy_alloc_security(xp, sec_ctx, NULL); |
| 3121 | } | 3124 | } |
| 3122 | 3125 | ||
| 3123 | static inline int security_xfrm_sock_policy_alloc(struct xfrm_policy *xp, struct sock *sk) | ||
| 3124 | { | ||
| 3125 | return security_ops->xfrm_policy_alloc_security(xp, NULL, sk); | ||
| 3126 | } | ||
| 3127 | |||
| 3128 | static inline int security_xfrm_policy_clone(struct xfrm_policy *old, struct xfrm_policy *new) | 3126 | static inline int security_xfrm_policy_clone(struct xfrm_policy *old, struct xfrm_policy *new) |
| 3129 | { | 3127 | { |
| 3130 | return security_ops->xfrm_policy_clone_security(old, new); | 3128 | return security_ops->xfrm_policy_clone_security(old, new); |
| @@ -3175,9 +3173,10 @@ static inline int security_xfrm_state_pol_flow_match(struct xfrm_state *x, | |||
| 3175 | return security_ops->xfrm_state_pol_flow_match(x, xp, fl); | 3173 | return security_ops->xfrm_state_pol_flow_match(x, xp, fl); |
| 3176 | } | 3174 | } |
| 3177 | 3175 | ||
| 3178 | static inline int security_xfrm_flow_state_match(struct flowi *fl, struct xfrm_state *xfrm) | 3176 | static inline int security_xfrm_flow_state_match(struct flowi *fl, |
| 3177 | struct xfrm_state *xfrm, struct xfrm_policy *xp) | ||
| 3179 | { | 3178 | { |
| 3180 | return security_ops->xfrm_flow_state_match(fl, xfrm); | 3179 | return security_ops->xfrm_flow_state_match(fl, xfrm, xp); |
| 3181 | } | 3180 | } |
| 3182 | 3181 | ||
| 3183 | static inline int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) | 3182 | static inline int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid) |
| @@ -3197,11 +3196,6 @@ static inline int security_xfrm_policy_alloc(struct xfrm_policy *xp, struct xfrm | |||
| 3197 | return 0; | 3196 | return 0; |
| 3198 | } | 3197 | } |
| 3199 | 3198 | ||
| 3200 | static inline int security_xfrm_sock_policy_alloc(struct xfrm_policy *xp, struct sock *sk) | ||
| 3201 | { | ||
| 3202 | return 0; | ||
| 3203 | } | ||
| 3204 | |||
| 3205 | static inline int security_xfrm_policy_clone(struct xfrm_policy *old, struct xfrm_policy *new) | 3199 | static inline int security_xfrm_policy_clone(struct xfrm_policy *old, struct xfrm_policy *new) |
| 3206 | { | 3200 | { |
| 3207 | return 0; | 3201 | return 0; |
| @@ -3249,7 +3243,7 @@ static inline int security_xfrm_state_pol_flow_match(struct xfrm_state *x, | |||
| 3249 | } | 3243 | } |
| 3250 | 3244 | ||
| 3251 | static inline int security_xfrm_flow_state_match(struct flowi *fl, | 3245 | static inline int security_xfrm_flow_state_match(struct flowi *fl, |
| 3252 | struct xfrm_state *xfrm) | 3246 | struct xfrm_state *xfrm, struct xfrm_policy *xp) |
| 3253 | { | 3247 | { |
| 3254 | return 1; | 3248 | return 1; |
| 3255 | } | 3249 | } |
