3de4bab5b9
Now that labeled IPsec makes use of the peer_sid field in the sk_security_struct we can remove a lot of the special cases between labeled IPsec and NetLabel. In addition, create a new function, security_skb_extlbl_sid(), which we can use in several places to get the security context of the packet's external label which allows us to further simplify the code in a few places. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: James Morris <jmorris@namei.org>
125 lines
3.2 KiB
C
125 lines
3.2 KiB
C
/*
|
|
* SELinux interface to the NetLabel subsystem
|
|
*
|
|
* Author : Paul Moore <paul.moore@hp.com>
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*
|
|
*/
|
|
|
|
#ifndef _SELINUX_NETLABEL_H_
|
|
#define _SELINUX_NETLABEL_H_
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/net.h>
|
|
#include <linux/skbuff.h>
|
|
#include <net/sock.h>
|
|
|
|
#include "avc.h"
|
|
#include "objsec.h"
|
|
|
|
#ifdef CONFIG_NETLABEL
|
|
void selinux_netlbl_cache_invalidate(void);
|
|
int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid);
|
|
int selinux_netlbl_socket_post_create(struct socket *sock);
|
|
void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
|
|
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
struct avc_audit_data *ad);
|
|
void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
|
|
int family);
|
|
void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
|
|
int family);
|
|
void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
|
|
struct sk_security_struct *newssec);
|
|
int selinux_netlbl_inode_permission(struct inode *inode, int mask);
|
|
int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname);
|
|
#else
|
|
static inline void selinux_netlbl_cache_invalidate(void)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
|
|
u32 base_sid,
|
|
u32 *sid)
|
|
{
|
|
*sid = SECSID_NULL;
|
|
return 0;
|
|
}
|
|
|
|
static inline int selinux_netlbl_socket_post_create(struct socket *sock)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sock_graft(struct sock *sk,
|
|
struct socket *sock)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
struct avc_audit_data *ad)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_reset(
|
|
struct sk_security_struct *ssec,
|
|
int family)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_init(
|
|
struct sk_security_struct *ssec,
|
|
int family)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_clone(
|
|
struct sk_security_struct *ssec,
|
|
struct sk_security_struct *newssec)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline int selinux_netlbl_inode_permission(struct inode *inode,
|
|
int mask)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_NETLABEL */
|
|
|
|
#endif
|