This commit was manufactured by cvs2svn to create branch 'vserver'.
[linux-2.6.git] / security / selinux / include / selinux_netlabel.h
diff --git a/security/selinux/include/selinux_netlabel.h b/security/selinux/include/selinux_netlabel.h
new file mode 100644 (file)
index 0000000..2a732c9
--- /dev/null
@@ -0,0 +1,124 @@
+/*
+ * SELinux interface to the NetLabel subsystem
+ *
+ * Author : Paul Moore <paul.moore@hp.com>
+ *
+ */
+
+/*
+ * (c) Copyright Hewlett-Packard Development Company, L.P., 2006
+ *
+ * This program is free software;  you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY;  without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
+ * the GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program;  if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ *
+ */
+
+#ifndef _SELINUX_NETLABEL_H_
+#define _SELINUX_NETLABEL_H_
+
+#include <linux/types.h>
+#include <linux/fs.h>
+#include <linux/net.h>
+#include <linux/skbuff.h>
+#include <net/sock.h>
+
+#include "avc.h"
+#include "objsec.h"
+
+#ifdef CONFIG_NETLABEL
+void selinux_netlbl_cache_invalidate(void);
+int selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u32 base_sid, u32 *sid);
+int selinux_netlbl_socket_post_create(struct socket *sock);
+void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
+int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
+                               struct sk_buff *skb,
+                               struct avc_audit_data *ad);
+void selinux_netlbl_sk_security_reset(struct sk_security_struct *ssec,
+                                     int family);
+void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
+                                    int family);
+void selinux_netlbl_sk_security_clone(struct sk_security_struct *ssec,
+                                     struct sk_security_struct *newssec);
+int selinux_netlbl_inode_permission(struct inode *inode, int mask);
+int selinux_netlbl_socket_setsockopt(struct socket *sock,
+                                    int level,
+                                    int optname);
+#else
+static inline void selinux_netlbl_cache_invalidate(void)
+{
+       return;
+}
+
+static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
+                                              u32 base_sid,
+                                              u32 *sid)
+{
+       *sid = SECSID_NULL;
+       return 0;
+}
+
+static inline int selinux_netlbl_socket_post_create(struct socket *sock)
+{
+       return 0;
+}
+
+static inline void selinux_netlbl_sock_graft(struct sock *sk,
+                                            struct socket *sock)
+{
+       return;
+}
+
+static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
+                                             struct sk_buff *skb,
+                                             struct avc_audit_data *ad)
+{
+       return 0;
+}
+
+static inline void selinux_netlbl_sk_security_reset(
+                                              struct sk_security_struct *ssec,
+                                              int family)
+{
+       return;
+}
+
+static inline void selinux_netlbl_sk_security_init(
+                                              struct sk_security_struct *ssec,
+                                              int family)
+{
+       return;
+}
+
+static inline void selinux_netlbl_sk_security_clone(
+                                          struct sk_security_struct *ssec,
+                                          struct sk_security_struct *newssec)
+{
+       return;
+}
+
+static inline int selinux_netlbl_inode_permission(struct inode *inode,
+                                                 int mask)
+{
+       return 0;
+}
+
+static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
+                                                  int level,
+                                                  int optname)
+{
+       return 0;
+}
+#endif /* CONFIG_NETLABEL */
+
+#endif