]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - security/selinux/include/netlabel.h
SELinux: Better integration between peer labeling subsystems
[mirror_ubuntu-jammy-kernel.git] / security / selinux / include / netlabel.h
1 /*
2 * SELinux interface to the NetLabel subsystem
3 *
4 * Author : Paul Moore <paul.moore@hp.com>
5 *
6 */
7
8 /*
9 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
19 * the GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 *
25 */
26
27 #ifndef _SELINUX_NETLABEL_H_
28 #define _SELINUX_NETLABEL_H_
29
30 #include <linux/types.h>
31 #include <linux/fs.h>
32 #include <linux/net.h>
33 #include <linux/skbuff.h>
34 #include <net/sock.h>
35
36 #include "avc.h"
37 #include "objsec.h"
38
39 #ifdef CONFIG_NETLABEL
40 void selinux_netlbl_cache_invalidate(void);
41
42 void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
43 int family);
44 void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
45 int family);
46 void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
47 struct sk_security_struct *newssec);
48
49 int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
50 u16 family,
51 u32 base_sid,
52 u32 *type,
53 u32 *sid);
54
55 void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
56 int selinux_netlbl_socket_post_create(struct socket *sock);
57 int selinux_netlbl_inode_permission(struct inode *inode, int mask);
58 int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
59 struct sk_buff *skb,
60 u16 family,
61 struct avc_audit_data *ad);
62 int selinux_netlbl_socket_setsockopt(struct socket *sock,
63 int level,
64 int optname);
65 #else
66 static inline void selinux_netlbl_cache_invalidate(void)
67 {
68 return;
69 }
70
71 static inline void selinux_netlbl_sk_security_reset(
72 struct sk_security_struct *ssec,
73 int family)
74 {
75 return;
76 }
77 static inline void selinux_netlbl_sk_security_init(
78 struct sk_security_struct *ssec,
79 int family)
80 {
81 return;
82 }
83 static inline void selinux_netlbl_sk_security_clone(
84 struct sk_security_struct *ssec,
85 struct sk_security_struct *newssec)
86 {
87 return;
88 }
89
90 static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
91 u16 family,
92 u32 base_sid,
93 u32 *type,
94 u32 *sid)
95 {
96 *type = NETLBL_NLTYPE_NONE;
97 *sid = SECSID_NULL;
98 return 0;
99 }
100
101 static inline void selinux_netlbl_sock_graft(struct sock *sk,
102 struct socket *sock)
103 {
104 return;
105 }
106 static inline int selinux_netlbl_socket_post_create(struct socket *sock)
107 {
108 return 0;
109 }
110 static inline int selinux_netlbl_inode_permission(struct inode *inode,
111 int mask)
112 {
113 return 0;
114 }
115 static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
116 struct sk_buff *skb,
117 u16 family,
118 struct avc_audit_data *ad)
119 {
120 return 0;
121 }
122 static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
123 int level,
124 int optname)
125 {
126 return 0;
127 }
128 #endif /* CONFIG_NETLABEL */
129
130 #endif