c60475bf35
In the beginning I named the file selinux_netlabel.h to avoid potential namespace colisions. However, over time I have realized that there are several other similar cases of multiple header files with the same name so I'm changing the name to something which better fits with existing naming conventions. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: James Morris <jmorris@namei.org>
122 lines
3.3 KiB
C
122 lines
3.3 KiB
C
/*
|
|
* SELinux interface to the NetLabel subsystem
|
|
*
|
|
* Author : Paul Moore <paul.moore@hp.com>
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*
|
|
*/
|
|
|
|
#ifndef _SELINUX_NETLABEL_H_
|
|
#define _SELINUX_NETLABEL_H_
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/net.h>
|
|
#include <linux/skbuff.h>
|
|
#include <net/sock.h>
|
|
|
|
#include "avc.h"
|
|
#include "objsec.h"
|
|
|
|
#ifdef CONFIG_NETLABEL
|
|
void selinux_netlbl_cache_invalidate(void);
|
|
|
|
void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
|
|
int family);
|
|
void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
|
|
int family);
|
|
void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
|
|
struct sk_security_struct *newssec);
|
|
|
|
int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid);
|
|
|
|
void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
|
|
int selinux_netlbl_socket_post_create(struct socket *sock);
|
|
int selinux_netlbl_inode_permission(struct inode *inode, int mask);
|
|
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
struct avc_audit_data *ad);
|
|
int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname);
|
|
#else
|
|
static inline void selinux_netlbl_cache_invalidate(void)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_reset(
|
|
struct sk_security_struct *ssec,
|
|
int family)
|
|
{
|
|
return;
|
|
}
|
|
static inline void selinux_netlbl_sk_security_init(
|
|
struct sk_security_struct *ssec,
|
|
int family)
|
|
{
|
|
return;
|
|
}
|
|
static inline void selinux_netlbl_sk_security_clone(
|
|
struct sk_security_struct *ssec,
|
|
struct sk_security_struct *newssec)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
|
|
u32 base_sid,
|
|
u32 *sid)
|
|
{
|
|
*sid = SECSID_NULL;
|
|
return 0;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sock_graft(struct sock *sk,
|
|
struct socket *sock)
|
|
{
|
|
return;
|
|
}
|
|
static inline int selinux_netlbl_socket_post_create(struct socket *sock)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_inode_permission(struct inode *inode,
|
|
int mask)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
struct avc_audit_data *ad)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_NETLABEL */
|
|
|
|
#endif
|