aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
diff options
context:
space:
mode:
Diffstat (limited to 'include/linux/security.h')
-rw-r--r--include/linux/security.h25
1 files changed, 25 insertions, 0 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 294a0b228123..d70adc394f62 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -959,6 +959,12 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts)
959 * Sets the new child socket's sid to the openreq sid. 959 * Sets the new child socket's sid to the openreq sid.
960 * @inet_conn_established: 960 * @inet_conn_established:
961 * Sets the connection's peersid to the secmark on skb. 961 * Sets the connection's peersid to the secmark on skb.
962 * @secmark_relabel_packet:
963 * check if the process should be allowed to relabel packets to the given secid
964 * @security_secmark_refcount_inc
965 * tells the LSM to increment the number of secmark labeling rules loaded
966 * @security_secmark_refcount_dec
967 * tells the LSM to decrement the number of secmark labeling rules loaded
962 * @req_classify_flow: 968 * @req_classify_flow:
963 * Sets the flow's sid to the openreq sid. 969 * Sets the flow's sid to the openreq sid.
964 * @tun_dev_create: 970 * @tun_dev_create:
@@ -1593,6 +1599,9 @@ struct security_operations {
1593 struct request_sock *req); 1599 struct request_sock *req);
1594 void (*inet_csk_clone) (struct sock *newsk, const struct request_sock *req); 1600 void (*inet_csk_clone) (struct sock *newsk, const struct request_sock *req);
1595 void (*inet_conn_established) (struct sock *sk, struct sk_buff *skb); 1601 void (*inet_conn_established) (struct sock *sk, struct sk_buff *skb);
1602 int (*secmark_relabel_packet) (u32 secid);
1603 void (*secmark_refcount_inc) (void);
1604 void (*secmark_refcount_dec) (void);
1596 void (*req_classify_flow) (const struct request_sock *req, struct flowi *fl); 1605 void (*req_classify_flow) (const struct request_sock *req, struct flowi *fl);
1597 int (*tun_dev_create)(void); 1606 int (*tun_dev_create)(void);
1598 void (*tun_dev_post_create)(struct sock *sk); 1607 void (*tun_dev_post_create)(struct sock *sk);
@@ -2547,6 +2556,9 @@ void security_inet_csk_clone(struct sock *newsk,
2547 const struct request_sock *req); 2556 const struct request_sock *req);
2548void security_inet_conn_established(struct sock *sk, 2557void security_inet_conn_established(struct sock *sk,
2549 struct sk_buff *skb); 2558 struct sk_buff *skb);
2559int security_secmark_relabel_packet(u32 secid);
2560void security_secmark_refcount_inc(void);
2561void security_secmark_refcount_dec(void);
2550int security_tun_dev_create(void); 2562int security_tun_dev_create(void);
2551void security_tun_dev_post_create(struct sock *sk); 2563void security_tun_dev_post_create(struct sock *sk);
2552int security_tun_dev_attach(struct sock *sk); 2564int security_tun_dev_attach(struct sock *sk);
@@ -2701,6 +2713,19 @@ static inline void security_inet_conn_established(struct sock *sk,
2701{ 2713{
2702} 2714}
2703 2715
2716static inline int security_secmark_relabel_packet(u32 secid)
2717{
2718 return 0;
2719}
2720
2721static inline void security_secmark_refcount_inc(void)
2722{
2723}
2724
2725static inline void security_secmark_refcount_dec(void)
2726{
2727}
2728
2704static inline int security_tun_dev_create(void) 2729static inline int security_tun_dev_create(void)
2705{ 2730{
2706 return 0; 2731 return 0;