[MLSXFRM]: Add flow labeling
This labels the flows that could utilize IPSec xfrms at the points the flows are defined so that IPSec policy and SAs at the right label can be used. The following protos are currently not handled, but they should continue to be able to use single-labeled IPSec like they currently do. ipmr ip_gre ipip igmp sit sctp ip6_tunnel (IPv6 over IPv6 tunnel device) decnet Signed-off-by: Venkat Yekkirala <vyekkirala@TrustedCS.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
4e2ba18eae
commit
beb8d13bed
@ -809,9 +809,8 @@ static inline void dummy_sk_clone_security (const struct sock *sk, struct sock *
|
||||
{
|
||||
}
|
||||
|
||||
static unsigned int dummy_sk_getsid(struct sock *sk, struct flowi *fl, u8 dir)
|
||||
static inline void dummy_sk_getsecid(struct sock *sk, u32 *secid)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
|
||||
@ -866,7 +865,7 @@ static int dummy_xfrm_flow_state_match(struct flowi *fl, struct xfrm_state *xfrm
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int dummy_xfrm_decode_session(struct sk_buff *skb, struct flowi *fl)
|
||||
static int dummy_xfrm_decode_session(struct sk_buff *skb, u32 *fl, int ckall)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
@ -1083,7 +1082,7 @@ void security_fixup_ops (struct security_operations *ops)
|
||||
set_to_dummy_if_null(ops, sk_alloc_security);
|
||||
set_to_dummy_if_null(ops, sk_free_security);
|
||||
set_to_dummy_if_null(ops, sk_clone_security);
|
||||
set_to_dummy_if_null(ops, sk_getsid);
|
||||
set_to_dummy_if_null(ops, sk_getsecid);
|
||||
#endif /* CONFIG_SECURITY_NETWORK */
|
||||
#ifdef CONFIG_SECURITY_NETWORK_XFRM
|
||||
set_to_dummy_if_null(ops, xfrm_policy_alloc_security);
|
||||
|
Reference in New Issue
Block a user