2 * SELinux interface to the NetLabel subsystem
4 * Author : Paul Moore <paul.moore@hp.com>
9 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
19 * the GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
27 #ifndef _SELINUX_NETLABEL_H_
28 #define _SELINUX_NETLABEL_H_
30 #ifdef CONFIG_NETLABEL
31 void selinux_netlbl_cache_invalidate(void);
32 int selinux_netlbl_socket_post_create(struct socket *sock,
35 void selinux_netlbl_sock_graft(struct sock *sk, struct socket *sock);
36 u32 selinux_netlbl_inet_conn_request(struct sk_buff *skb, u32 sock_sid);
37 int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
39 struct avc_audit_data *ad);
40 u32 selinux_netlbl_socket_getpeersec_stream(struct socket *sock);
41 u32 selinux_netlbl_socket_getpeersec_dgram(struct sk_buff *skb);
42 void selinux_netlbl_sk_security_init(struct sk_security_struct *ssec,
44 void selinux_netlbl_sk_clone_security(struct sk_security_struct *ssec,
45 struct sk_security_struct *newssec);
47 int __selinux_netlbl_inode_permission(struct inode *inode, int mask);
49 * selinux_netlbl_inode_permission - Verify the socket is NetLabel labeled
50 * @inode: the file descriptor's inode
51 * @mask: the permission mask
54 * Looks at a file's inode and if it is marked as a socket protected by
55 * NetLabel then verify that the socket has been labeled, if not try to label
56 * the socket now with the inode's SID. Returns zero on success, negative
60 static inline int selinux_netlbl_inode_permission(struct inode *inode,
64 struct inode_security_struct *isec;
65 struct sk_security_struct *sksec;
67 if (!S_ISSOCK(inode->i_mode))
70 isec = inode->i_security;
71 sksec = SOCKET_I(inode)->sk->sk_security;
73 if (unlikely(sksec->nlbl_state == NLBL_REQUIRE &&
74 (mask & (MAY_WRITE | MAY_APPEND))))
75 rc = __selinux_netlbl_inode_permission(inode, mask);
81 static inline void selinux_netlbl_cache_invalidate(void)
86 static inline int selinux_netlbl_socket_post_create(struct socket *sock,
93 static inline void selinux_netlbl_sock_graft(struct sock *sk,
99 static inline u32 selinux_netlbl_inet_conn_request(struct sk_buff *skb,
105 static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
107 struct avc_audit_data *ad)
112 static inline u32 selinux_netlbl_socket_getpeersec_stream(struct socket *sock)
117 static inline u32 selinux_netlbl_socket_getpeersec_dgram(struct sk_buff *skb)
122 static inline void selinux_netlbl_sk_security_init(
123 struct sk_security_struct *ssec,
129 static inline void selinux_netlbl_sk_clone_security(
130 struct sk_security_struct *ssec,
131 struct sk_security_struct *newssec)
136 static inline int selinux_netlbl_inode_permission(struct inode *inode,
141 #endif /* CONFIG_NETLABEL */