netlabel.h 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. /*
  2. * SELinux interface to the NetLabel subsystem
  3. *
  4. * Author : Paul Moore <paul.moore@hp.com>
  5. *
  6. */
  7. /*
  8. * (c) Copyright Hewlett-Packard Development Company, L.P., 2006
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 2 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
  18. * the GNU General Public License for more details.
  19. *
  20. * You should have received a copy of the GNU General Public License
  21. * along with this program; if not, write to the Free Software
  22. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  23. *
  24. */
  25. #ifndef _SELINUX_NETLABEL_H_
  26. #define _SELINUX_NETLABEL_H_
  27. #include <linux/types.h>
  28. #include <linux/fs.h>
  29. #include <linux/net.h>
  30. #include <linux/skbuff.h>
  31. #include <net/sock.h>
  32. #include "avc.h"
  33. #include "objsec.h"
  34. #ifdef CONFIG_NETLABEL
  35. void selinux_netlbl_cache_invalidate(void);
  36. void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
  37. int family);
  38. void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
  39. int family);
  40. void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
  41. struct sk_security_struct *newssec);
  42. int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid);
  43. void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
  44. int selinux_netlbl_socket_post_create(struct socket *sock);
  45. int selinux_netlbl_inode_permission(struct inode *inode, int mask);
  46. int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
  47. struct sk_buff *skb,
  48. struct avc_audit_data *ad);
  49. int selinux_netlbl_socket_setsockopt(struct socket *sock,
  50. int level,
  51. int optname);
  52. #else
  53. static inline void selinux_netlbl_cache_invalidate(void)
  54. {
  55. return;
  56. }
  57. static inline void selinux_netlbl_sk_security_reset(
  58. struct sk_security_struct *ssec,
  59. int family)
  60. {
  61. return;
  62. }
  63. static inline void selinux_netlbl_sk_security_init(
  64. struct sk_security_struct *ssec,
  65. int family)
  66. {
  67. return;
  68. }
  69. static inline void selinux_netlbl_sk_security_clone(
  70. struct sk_security_struct *ssec,
  71. struct sk_security_struct *newssec)
  72. {
  73. return;
  74. }
  75. static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
  76. u32 base_sid,
  77. u32 *sid)
  78. {
  79. *sid = SECSID_NULL;
  80. return 0;
  81. }
  82. static inline void selinux_netlbl_sock_graft(struct sock *sk,
  83. struct socket *sock)
  84. {
  85. return;
  86. }
  87. static inline int selinux_netlbl_socket_post_create(struct socket *sock)
  88. {
  89. return 0;
  90. }
  91. static inline int selinux_netlbl_inode_permission(struct inode *inode,
  92. int mask)
  93. {
  94. return 0;
  95. }
  96. static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
  97. struct sk_buff *skb,
  98. struct avc_audit_data *ad)
  99. {
  100. return 0;
  101. }
  102. static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
  103. int level,
  104. int optname)
  105. {
  106. return 0;
  107. }
  108. #endif /* CONFIG_NETLABEL */
  109. #endif