netlabel.h 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. /*
  2. * SELinux interface to the NetLabel subsystem
  3. *
  4. * Author : Paul Moore <paul.moore@hp.com>
  5. *
  6. */
  7. /*
  8. * (c) Copyright Hewlett-Packard Development Company, L.P., 2006
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 2 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
  18. * the GNU General Public License for more details.
  19. *
  20. * You should have received a copy of the GNU General Public License
  21. * along with this program; if not, write to the Free Software
  22. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  23. *
  24. */
  25. #ifndef _SELINUX_NETLABEL_H_
  26. #define _SELINUX_NETLABEL_H_
  27. #include <linux/types.h>
  28. #include <linux/fs.h>
  29. #include <linux/net.h>
  30. #include <linux/skbuff.h>
  31. #include <net/sock.h>
  32. #include "avc.h"
  33. #include "objsec.h"
  34. #ifdef CONFIG_NETLABEL
  35. void selinux_netlbl_cache_invalidate(void);
  36. void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
  37. int family);
  38. void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
  39. int family);
  40. void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
  41. struct sk_security_struct *newssec);
  42. int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
  43. u16 family,
  44. u32 *type,
  45. u32 *sid);
  46. void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
  47. int selinux_netlbl_socket_post_create(struct socket *sock);
  48. int selinux_netlbl_inode_permission(struct inode *inode, int mask);
  49. int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
  50. struct sk_buff *skb,
  51. u16 family,
  52. struct avc_audit_data *ad);
  53. int selinux_netlbl_socket_setsockopt(struct socket *sock,
  54. int level,
  55. int optname);
  56. #else
  57. static inline void selinux_netlbl_cache_invalidate(void)
  58. {
  59. return;
  60. }
  61. static inline void selinux_netlbl_sk_security_reset(
  62. struct sk_security_struct *ssec,
  63. int family)
  64. {
  65. return;
  66. }
  67. static inline void selinux_netlbl_sk_security_init(
  68. struct sk_security_struct *ssec,
  69. int family)
  70. {
  71. return;
  72. }
  73. static inline void selinux_netlbl_sk_security_clone(
  74. struct sk_security_struct *ssec,
  75. struct sk_security_struct *newssec)
  76. {
  77. return;
  78. }
  79. static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
  80. u16 family,
  81. u32 *type,
  82. u32 *sid)
  83. {
  84. *type = NETLBL_NLTYPE_NONE;
  85. *sid = SECSID_NULL;
  86. return 0;
  87. }
  88. static inline void selinux_netlbl_sock_graft(struct sock *sk,
  89. struct socket *sock)
  90. {
  91. return;
  92. }
  93. static inline int selinux_netlbl_socket_post_create(struct socket *sock)
  94. {
  95. return 0;
  96. }
  97. static inline int selinux_netlbl_inode_permission(struct inode *inode,
  98. int mask)
  99. {
  100. return 0;
  101. }
  102. static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
  103. struct sk_buff *skb,
  104. u16 family,
  105. struct avc_audit_data *ad)
  106. {
  107. return 0;
  108. }
  109. static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
  110. int level,
  111. int optname)
  112. {
  113. return 0;
  114. }
  115. #endif /* CONFIG_NETLABEL */
  116. #endif