diff options
Diffstat (limited to 'security/selinux/include/selinux_netlabel.h')
-rw-r--r-- | security/selinux/include/selinux_netlabel.h | 119 |
1 files changed, 119 insertions, 0 deletions
diff --git a/security/selinux/include/selinux_netlabel.h b/security/selinux/include/selinux_netlabel.h new file mode 100644 index 000000000000..ecab4bddaaf4 --- /dev/null +++ b/security/selinux/include/selinux_netlabel.h | |||
@@ -0,0 +1,119 @@ | |||
1 | /* | ||
2 | * SELinux interface to the NetLabel subsystem | ||
3 | * | ||
4 | * Author : Paul Moore <paul.moore@hp.com> | ||
5 | * | ||
6 | */ | ||
7 | |||
8 | /* | ||
9 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 | ||
10 | * | ||
11 | * This program is free software; you can redistribute it and/or modify | ||
12 | * it under the terms of the GNU General Public License as published by | ||
13 | * the Free Software Foundation; either version 2 of the License, or | ||
14 | * (at your option) any later version. | ||
15 | * | ||
16 | * This program is distributed in the hope that it will be useful, | ||
17 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
18 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | ||
19 | * the GNU General Public License for more details. | ||
20 | * | ||
21 | * You should have received a copy of the GNU General Public License | ||
22 | * along with this program; if not, write to the Free Software | ||
23 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | ||
24 | * | ||
25 | */ | ||
26 | |||
27 | #ifndef _SELINUX_NETLABEL_H_ | ||
28 | #define _SELINUX_NETLABEL_H_ | ||
29 | |||
30 | #include <linux/types.h> | ||
31 | #include <linux/fs.h> | ||
32 | #include <linux/net.h> | ||
33 | #include <linux/skbuff.h> | ||
34 | #include <net/sock.h> | ||
35 | |||
36 | #include "avc.h" | ||
37 | #include "objsec.h" | ||
38 | |||
39 | #ifdef CONFIG_NETLABEL | ||
40 | void selinux_netlbl_cache_invalidate(void); | ||
41 | int selinux_netlbl_socket_post_create(struct socket *sock, | ||
42 | int sock_family, | ||
43 | u32 sid); | ||
44 | void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock); | ||
45 | u32 selinux_netlbl_inet_conn_request(struct sk_buff *skb, u32 sock_sid); | ||
46 | int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
47 | struct sk_buff *skb, | ||
48 | struct avc_audit_data *ad); | ||
49 | u32 selinux_netlbl_socket_getpeersec_stream(struct socket *sock); | ||
50 | u32 selinux_netlbl_socket_getpeersec_dgram(struct sk_buff *skb); | ||
51 | void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec, | ||
52 | int family); | ||
53 | void selinux_netlbl_sk_clone_security(struct sk_security_struct *ssec, | ||
54 | struct sk_security_struct *newssec); | ||
55 | int selinux_netlbl_inode_permission(struct inode *inode, int mask); | ||
56 | #else | ||
57 | static inline void selinux_netlbl_cache_invalidate(void) | ||
58 | { | ||
59 | return; | ||
60 | } | ||
61 | |||
62 | static inline int selinux_netlbl_socket_post_create(struct socket *sock, | ||
63 | int sock_family, | ||
64 | u32 sid) | ||
65 | { | ||
66 | return 0; | ||
67 | } | ||
68 | |||
69 | static inline void selinux_netlbl_sock_graft(struct sock *sk, | ||
70 | struct socket *sock) | ||
71 | { | ||
72 | return; | ||
73 | } | ||
74 | |||
75 | static inline u32 selinux_netlbl_inet_conn_request(struct sk_buff *skb, | ||
76 | u32 sock_sid) | ||
77 | { | ||
78 | return SECSID_NULL; | ||
79 | } | ||
80 | |||
81 | static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, | ||
82 | struct sk_buff *skb, | ||
83 | struct avc_audit_data *ad) | ||
84 | { | ||
85 | return 0; | ||
86 | } | ||
87 | |||
88 | static inline u32 selinux_netlbl_socket_getpeersec_stream(struct socket *sock) | ||
89 | { | ||
90 | return SECSID_NULL; | ||
91 | } | ||
92 | |||
93 | static inline u32 selinux_netlbl_socket_getpeersec_dgram(struct sk_buff *skb) | ||
94 | { | ||
95 | return SECSID_NULL; | ||
96 | } | ||
97 | |||
98 | static inline void selinux_netlbl_sk_security_init( | ||
99 | struct sk_security_struct *ssec, | ||
100 | int family) | ||
101 | { | ||
102 | return; | ||
103 | } | ||
104 | |||
105 | static inline void selinux_netlbl_sk_clone_security( | ||
106 | struct sk_security_struct *ssec, | ||
107 | struct sk_security_struct *newssec) | ||
108 | { | ||
109 | return; | ||
110 | } | ||
111 | |||
112 | static inline int selinux_netlbl_inode_permission(struct inode *inode, | ||
113 | int mask) | ||
114 | { | ||
115 | return 0; | ||
116 | } | ||
117 | #endif /* CONFIG_NETLABEL */ | ||
118 | |||
119 | #endif | ||