diff options
author | Matthew Garrett <mjg59@google.com> | 2018-05-24 13:27:46 -0700 |
---|---|---|
committer | John Johansen <john.johansen@canonical.com> | 2018-10-03 06:18:38 -0700 |
commit | 9caafbe2b4cf4c635826a2832e93cf648605de8b (patch) | |
tree | 3d09ad1db13f0be16c42f04133101b9a36f777e5 /security/apparmor/include/net.h | |
parent | 617a629c08bfffb05249131079d9a38322902e5b (diff) | |
download | linux-stable-9caafbe2b4cf4c635826a2832e93cf648605de8b.tar.gz linux-stable-9caafbe2b4cf4c635826a2832e93cf648605de8b.tar.bz2 linux-stable-9caafbe2b4cf4c635826a2832e93cf648605de8b.zip |
apparmor: Parse secmark policy
Add support for parsing secmark policy provided by userspace, and
store that in the overall policy.
Signed-off-by: Matthew Garrett <mjg59@google.com>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Diffstat (limited to 'security/apparmor/include/net.h')
-rw-r--r-- | security/apparmor/include/net.h | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/security/apparmor/include/net.h b/security/apparmor/include/net.h index ec7228e857a9..7334ac966d01 100644 --- a/security/apparmor/include/net.h +++ b/security/apparmor/include/net.h @@ -83,6 +83,13 @@ struct aa_sk_ctx { __e; \ }) +struct aa_secmark { + u8 audit; + u8 deny; + u32 secid; + char *label; +}; + extern struct aa_sfs_entry aa_sfs_entry_network[]; void audit_net_cb(struct audit_buffer *ab, void *va); @@ -103,4 +110,7 @@ int aa_sk_perm(const char *op, u32 request, struct sock *sk); int aa_sock_file_perm(struct aa_label *label, const char *op, u32 request, struct socket *sock); +int apparmor_secmark_check(struct aa_label *label, char *op, u32 request, + u32 secid, struct sock *sk); + #endif /* __AA_NET_H */ |