111a03f78SPaul Moore /* 211a03f78SPaul Moore * NetLabel System 311a03f78SPaul Moore * 411a03f78SPaul Moore * The NetLabel system manages static and dynamic label mappings for network 511a03f78SPaul Moore * protocols such as CIPSO and RIPSO. 611a03f78SPaul Moore * 711a03f78SPaul Moore * Author: Paul Moore <paul.moore@hp.com> 811a03f78SPaul Moore * 911a03f78SPaul Moore */ 1011a03f78SPaul Moore 1111a03f78SPaul Moore /* 1211a03f78SPaul Moore * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 1311a03f78SPaul Moore * 1411a03f78SPaul Moore * This program is free software; you can redistribute it and/or modify 1511a03f78SPaul Moore * it under the terms of the GNU General Public License as published by 1611a03f78SPaul Moore * the Free Software Foundation; either version 2 of the License, or 1711a03f78SPaul Moore * (at your option) any later version. 1811a03f78SPaul Moore * 1911a03f78SPaul Moore * This program is distributed in the hope that it will be useful, 2011a03f78SPaul Moore * but WITHOUT ANY WARRANTY; without even the implied warranty of 2111a03f78SPaul Moore * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See 2211a03f78SPaul Moore * the GNU General Public License for more details. 2311a03f78SPaul Moore * 2411a03f78SPaul Moore * You should have received a copy of the GNU General Public License 2511a03f78SPaul Moore * along with this program; if not, write to the Free Software 2611a03f78SPaul Moore * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 2711a03f78SPaul Moore * 2811a03f78SPaul Moore */ 2911a03f78SPaul Moore 3011a03f78SPaul Moore #ifndef _NETLABEL_H 3111a03f78SPaul Moore #define _NETLABEL_H 3211a03f78SPaul Moore 3311a03f78SPaul Moore #include <linux/types.h> 347a0e1d60SPaul Moore #include <linux/net.h> 3511a03f78SPaul Moore #include <linux/skbuff.h> 3611a03f78SPaul Moore #include <net/netlink.h> 37ffb733c6Spaul.moore@hp.com #include <asm/atomic.h> 3811a03f78SPaul Moore 3911a03f78SPaul Moore /* 4011a03f78SPaul Moore * NetLabel - A management interface for maintaining network packet label 4111a03f78SPaul Moore * mapping tables for explicit packet labling protocols. 4211a03f78SPaul Moore * 4311a03f78SPaul Moore * Network protocols such as CIPSO and RIPSO require a label translation layer 4411a03f78SPaul Moore * to convert the label on the packet into something meaningful on the host 4511a03f78SPaul Moore * machine. In the current Linux implementation these mapping tables live 4611a03f78SPaul Moore * inside the kernel; NetLabel provides a mechanism for user space applications 4711a03f78SPaul Moore * to manage these mapping tables. 4811a03f78SPaul Moore * 4911a03f78SPaul Moore * NetLabel makes use of the Generic NETLINK mechanism as a transport layer to 5011a03f78SPaul Moore * send messages between kernel and user space. The general format of a 5111a03f78SPaul Moore * NetLabel message is shown below: 5211a03f78SPaul Moore * 5311a03f78SPaul Moore * +-----------------+-------------------+--------- --- -- - 5411a03f78SPaul Moore * | struct nlmsghdr | struct genlmsghdr | payload 5511a03f78SPaul Moore * +-----------------+-------------------+--------- --- -- - 5611a03f78SPaul Moore * 5711a03f78SPaul Moore * The 'nlmsghdr' and 'genlmsghdr' structs should be dealt with like normal. 5811a03f78SPaul Moore * The payload is dependent on the subsystem specified in the 5911a03f78SPaul Moore * 'nlmsghdr->nlmsg_type' and should be defined below, supporting functions 6011a03f78SPaul Moore * should be defined in the corresponding net/netlabel/netlabel_<subsys>.h|c 61fcd48280SPaul Moore * file. All of the fields in the NetLabel payload are NETLINK attributes, see 62fcd48280SPaul Moore * the include/net/netlink.h file for more information on NETLINK attributes. 6311a03f78SPaul Moore * 6411a03f78SPaul Moore */ 6511a03f78SPaul Moore 6611a03f78SPaul Moore /* 6711a03f78SPaul Moore * NetLabel NETLINK protocol 6811a03f78SPaul Moore */ 6911a03f78SPaul Moore 70*8cc44579SPaul Moore /* NetLabel NETLINK protocol version 71*8cc44579SPaul Moore * 1: initial version 72*8cc44579SPaul Moore * 2: added static labels for unlabeled connections 73*8cc44579SPaul Moore */ 74*8cc44579SPaul Moore #define NETLBL_PROTO_VERSION 2 7511a03f78SPaul Moore 7611a03f78SPaul Moore /* NetLabel NETLINK types/families */ 7711a03f78SPaul Moore #define NETLBL_NLTYPE_NONE 0 7811a03f78SPaul Moore #define NETLBL_NLTYPE_MGMT 1 7911a03f78SPaul Moore #define NETLBL_NLTYPE_MGMT_NAME "NLBL_MGMT" 8011a03f78SPaul Moore #define NETLBL_NLTYPE_RIPSO 2 8111a03f78SPaul Moore #define NETLBL_NLTYPE_RIPSO_NAME "NLBL_RIPSO" 8211a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV4 3 8311a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV4_NAME "NLBL_CIPSOv4" 8411a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV6 4 8511a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV6_NAME "NLBL_CIPSOv6" 8611a03f78SPaul Moore #define NETLBL_NLTYPE_UNLABELED 5 8711a03f78SPaul Moore #define NETLBL_NLTYPE_UNLABELED_NAME "NLBL_UNLBL" 8811a03f78SPaul Moore 8911a03f78SPaul Moore /* 9011a03f78SPaul Moore * NetLabel - Kernel API for accessing the network packet label mappings. 9111a03f78SPaul Moore * 9211a03f78SPaul Moore * The following functions are provided for use by other kernel modules, 9311a03f78SPaul Moore * specifically kernel LSM modules, to provide a consistent, transparent API 9411a03f78SPaul Moore * for dealing with explicit packet labeling protocols such as CIPSO and 9511a03f78SPaul Moore * RIPSO. The functions defined here are implemented in the 9611a03f78SPaul Moore * net/netlabel/netlabel_kapi.c file. 9711a03f78SPaul Moore * 9811a03f78SPaul Moore */ 9911a03f78SPaul Moore 10095d4e6beSPaul Moore /* NetLabel audit information */ 10195d4e6beSPaul Moore struct netlbl_audit { 10295d4e6beSPaul Moore u32 secid; 10395d4e6beSPaul Moore uid_t loginuid; 10495d4e6beSPaul Moore }; 10595d4e6beSPaul Moore 10611a03f78SPaul Moore /* Domain mapping definition struct */ 10711a03f78SPaul Moore struct netlbl_dom_map; 10811a03f78SPaul Moore 10911a03f78SPaul Moore /* Domain mapping operations */ 11095d4e6beSPaul Moore int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info); 11111a03f78SPaul Moore 11216efd454SPaul Moore /* 11316efd454SPaul Moore * LSM security attributes 11416efd454SPaul Moore */ 11516efd454SPaul Moore 11616efd454SPaul Moore /** 11716efd454SPaul Moore * struct netlbl_lsm_cache - NetLabel LSM security attribute cache 11816efd454SPaul Moore * @refcount: atomic reference counter 11916efd454SPaul Moore * @free: LSM supplied function to free the cache data 12016efd454SPaul Moore * @data: LSM supplied cache data 12116efd454SPaul Moore * 12216efd454SPaul Moore * Description: 12316efd454SPaul Moore * This structure is provided for LSMs which wish to make use of the NetLabel 12416efd454SPaul Moore * caching mechanism to store LSM specific data/attributes in the NetLabel 12516efd454SPaul Moore * cache. If the LSM has to perform a lot of translation from the NetLabel 12616efd454SPaul Moore * security attributes into it's own internal representation then the cache 12716efd454SPaul Moore * mechanism can provide a way to eliminate some or all of that translation 12816efd454SPaul Moore * overhead on a cache hit. 12916efd454SPaul Moore * 13016efd454SPaul Moore */ 13111a03f78SPaul Moore struct netlbl_lsm_cache { 132ffb733c6Spaul.moore@hp.com atomic_t refcount; 13311a03f78SPaul Moore void (*free) (const void *data); 13411a03f78SPaul Moore void *data; 13511a03f78SPaul Moore }; 13616efd454SPaul Moore 13716efd454SPaul Moore /** 13816efd454SPaul Moore * struct netlbl_lsm_secattr_catmap - NetLabel LSM secattr category bitmap 13916efd454SPaul Moore * @startbit: the value of the lowest order bit in the bitmap 14016efd454SPaul Moore * @bitmap: the category bitmap 14116efd454SPaul Moore * @next: pointer to the next bitmap "node" or NULL 14216efd454SPaul Moore * 14316efd454SPaul Moore * Description: 14416efd454SPaul Moore * This structure is used to represent category bitmaps. Due to the large 14516efd454SPaul Moore * number of categories supported by most labeling protocols it is not 14616efd454SPaul Moore * practical to transfer a full bitmap internally so NetLabel adopts a sparse 14716efd454SPaul Moore * bitmap structure modeled after SELinux's ebitmap structure. 14816efd454SPaul Moore * The catmap bitmap field MUST be a power of two in length and large 14902752760SPaul Moore * enough to hold at least 240 bits. Special care (i.e. check the code!) 15002752760SPaul Moore * should be used when changing these values as the LSM implementation 15102752760SPaul Moore * probably has functions which rely on the sizes of these types to speed 15216efd454SPaul Moore * processing. 15316efd454SPaul Moore * 15416efd454SPaul Moore */ 15502752760SPaul Moore #define NETLBL_CATMAP_MAPTYPE u64 15602752760SPaul Moore #define NETLBL_CATMAP_MAPCNT 4 15702752760SPaul Moore #define NETLBL_CATMAP_MAPSIZE (sizeof(NETLBL_CATMAP_MAPTYPE) * 8) 15802752760SPaul Moore #define NETLBL_CATMAP_SIZE (NETLBL_CATMAP_MAPSIZE * \ 15902752760SPaul Moore NETLBL_CATMAP_MAPCNT) 16002752760SPaul Moore #define NETLBL_CATMAP_BIT (NETLBL_CATMAP_MAPTYPE)0x01 16102752760SPaul Moore struct netlbl_lsm_secattr_catmap { 16202752760SPaul Moore u32 startbit; 16302752760SPaul Moore NETLBL_CATMAP_MAPTYPE bitmap[NETLBL_CATMAP_MAPCNT]; 16402752760SPaul Moore struct netlbl_lsm_secattr_catmap *next; 16502752760SPaul Moore }; 16616efd454SPaul Moore 16716efd454SPaul Moore /** 16816efd454SPaul Moore * struct netlbl_lsm_secattr - NetLabel LSM security attributes 16916efd454SPaul Moore * @flags: indicate which attributes are contained in this structure 17016efd454SPaul Moore * @type: indicate the NLTYPE of the attributes 17116efd454SPaul Moore * @domain: the NetLabel LSM domain 17216efd454SPaul Moore * @cache: NetLabel LSM specific cache 17316efd454SPaul Moore * @attr.mls: MLS sensitivity label 17416efd454SPaul Moore * @attr.mls.cat: MLS category bitmap 17516efd454SPaul Moore * @attr.mls.lvl: MLS sensitivity level 17616efd454SPaul Moore * @attr.secid: LSM specific secid token 17716efd454SPaul Moore * 17816efd454SPaul Moore * Description: 17916efd454SPaul Moore * This structure is used to pass security attributes between NetLabel and the 18016efd454SPaul Moore * LSM modules. The flags field is used to specify which fields within the 18116efd454SPaul Moore * struct are valid and valid values can be created by bitwise OR'ing the 18216efd454SPaul Moore * NETLBL_SECATTR_* defines. The domain field is typically set by the LSM to 18316efd454SPaul Moore * specify domain specific configuration settings and is not usually used by 18416efd454SPaul Moore * NetLabel itself when returning security attributes to the LSM. 18516efd454SPaul Moore * 18616efd454SPaul Moore */ 187701a90baSPaul Moore #define NETLBL_SECATTR_NONE 0x00000000 188701a90baSPaul Moore #define NETLBL_SECATTR_DOMAIN 0x00000001 189701a90baSPaul Moore #define NETLBL_SECATTR_CACHE 0x00000002 190701a90baSPaul Moore #define NETLBL_SECATTR_MLS_LVL 0x00000004 191701a90baSPaul Moore #define NETLBL_SECATTR_MLS_CAT 0x00000008 19216efd454SPaul Moore #define NETLBL_SECATTR_SECID 0x00000010 1939534f71cSPaul Moore #define NETLBL_SECATTR_CACHEABLE (NETLBL_SECATTR_MLS_LVL | \ 19416efd454SPaul Moore NETLBL_SECATTR_MLS_CAT | \ 19516efd454SPaul Moore NETLBL_SECATTR_SECID) 19611a03f78SPaul Moore struct netlbl_lsm_secattr { 197701a90baSPaul Moore u32 flags; 19816efd454SPaul Moore u32 type; 19911a03f78SPaul Moore char *domain; 200ffb733c6Spaul.moore@hp.com struct netlbl_lsm_cache *cache; 20116efd454SPaul Moore union { 20216efd454SPaul Moore struct { 20316efd454SPaul Moore struct netlbl_lsm_secattr_catmap *cat; 20416efd454SPaul Moore u32 lvl; 20516efd454SPaul Moore } mls; 20616efd454SPaul Moore u32 secid; 20716efd454SPaul Moore } attr; 20811a03f78SPaul Moore }; 20911a03f78SPaul Moore 21011a03f78SPaul Moore /* 21123bcdc1aSPaul Moore * LSM security attribute operations (inline) 21211a03f78SPaul Moore */ 21311a03f78SPaul Moore 21411a03f78SPaul Moore /** 215ffb733c6Spaul.moore@hp.com * netlbl_secattr_cache_alloc - Allocate and initialize a secattr cache 216ffb733c6Spaul.moore@hp.com * @flags: the memory allocation flags 217ffb733c6Spaul.moore@hp.com * 218ffb733c6Spaul.moore@hp.com * Description: 219ffb733c6Spaul.moore@hp.com * Allocate and initialize a netlbl_lsm_cache structure. Returns a pointer 220ffb733c6Spaul.moore@hp.com * on success, NULL on failure. 221ffb733c6Spaul.moore@hp.com * 222ffb733c6Spaul.moore@hp.com */ 223645408d1SAl Viro static inline struct netlbl_lsm_cache *netlbl_secattr_cache_alloc(gfp_t flags) 224ffb733c6Spaul.moore@hp.com { 225ffb733c6Spaul.moore@hp.com struct netlbl_lsm_cache *cache; 226ffb733c6Spaul.moore@hp.com 227ffb733c6Spaul.moore@hp.com cache = kzalloc(sizeof(*cache), flags); 228ffb733c6Spaul.moore@hp.com if (cache) 229ffb733c6Spaul.moore@hp.com atomic_set(&cache->refcount, 1); 230ffb733c6Spaul.moore@hp.com return cache; 231ffb733c6Spaul.moore@hp.com } 232ffb733c6Spaul.moore@hp.com 233ffb733c6Spaul.moore@hp.com /** 234ffb733c6Spaul.moore@hp.com * netlbl_secattr_cache_free - Frees a netlbl_lsm_cache struct 235ffb733c6Spaul.moore@hp.com * @cache: the struct to free 236ffb733c6Spaul.moore@hp.com * 237ffb733c6Spaul.moore@hp.com * Description: 238ffb733c6Spaul.moore@hp.com * Frees @secattr including all of the internal buffers. 239ffb733c6Spaul.moore@hp.com * 240ffb733c6Spaul.moore@hp.com */ 241ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_cache_free(struct netlbl_lsm_cache *cache) 242ffb733c6Spaul.moore@hp.com { 243ffb733c6Spaul.moore@hp.com if (!atomic_dec_and_test(&cache->refcount)) 244ffb733c6Spaul.moore@hp.com return; 245ffb733c6Spaul.moore@hp.com 246ffb733c6Spaul.moore@hp.com if (cache->free) 247ffb733c6Spaul.moore@hp.com cache->free(cache->data); 248ffb733c6Spaul.moore@hp.com kfree(cache); 249ffb733c6Spaul.moore@hp.com } 250ffb733c6Spaul.moore@hp.com 251ffb733c6Spaul.moore@hp.com /** 25202752760SPaul Moore * netlbl_secattr_catmap_alloc - Allocate a LSM secattr catmap 25302752760SPaul Moore * @flags: memory allocation flags 25402752760SPaul Moore * 25502752760SPaul Moore * Description: 25602752760SPaul Moore * Allocate memory for a LSM secattr catmap, returns a pointer on success, NULL 25702752760SPaul Moore * on failure. 25802752760SPaul Moore * 25902752760SPaul Moore */ 26002752760SPaul Moore static inline struct netlbl_lsm_secattr_catmap *netlbl_secattr_catmap_alloc( 26102752760SPaul Moore gfp_t flags) 26202752760SPaul Moore { 26302752760SPaul Moore return kzalloc(sizeof(struct netlbl_lsm_secattr_catmap), flags); 26402752760SPaul Moore } 26502752760SPaul Moore 26602752760SPaul Moore /** 26702752760SPaul Moore * netlbl_secattr_catmap_free - Free a LSM secattr catmap 26802752760SPaul Moore * @catmap: the category bitmap 26902752760SPaul Moore * 27002752760SPaul Moore * Description: 27102752760SPaul Moore * Free a LSM secattr catmap. 27202752760SPaul Moore * 27302752760SPaul Moore */ 27402752760SPaul Moore static inline void netlbl_secattr_catmap_free( 27502752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap) 27602752760SPaul Moore { 27702752760SPaul Moore struct netlbl_lsm_secattr_catmap *iter; 27802752760SPaul Moore 27902752760SPaul Moore do { 28002752760SPaul Moore iter = catmap; 28102752760SPaul Moore catmap = catmap->next; 28202752760SPaul Moore kfree(iter); 28302752760SPaul Moore } while (catmap); 28402752760SPaul Moore } 28502752760SPaul Moore 28602752760SPaul Moore /** 28711a03f78SPaul Moore * netlbl_secattr_init - Initialize a netlbl_lsm_secattr struct 28811a03f78SPaul Moore * @secattr: the struct to initialize 28911a03f78SPaul Moore * 29011a03f78SPaul Moore * Description: 291c6fa82a9SPaul Moore * Initialize an already allocated netlbl_lsm_secattr struct. 29211a03f78SPaul Moore * 29311a03f78SPaul Moore */ 294c6fa82a9SPaul Moore static inline void netlbl_secattr_init(struct netlbl_lsm_secattr *secattr) 29511a03f78SPaul Moore { 29616efd454SPaul Moore memset(secattr, 0, sizeof(*secattr)); 29711a03f78SPaul Moore } 29811a03f78SPaul Moore 29911a03f78SPaul Moore /** 30011a03f78SPaul Moore * netlbl_secattr_destroy - Clears a netlbl_lsm_secattr struct 30111a03f78SPaul Moore * @secattr: the struct to clear 30211a03f78SPaul Moore * 30311a03f78SPaul Moore * Description: 30411a03f78SPaul Moore * Destroys the @secattr struct, including freeing all of the internal buffers. 305ffb733c6Spaul.moore@hp.com * The struct must be reset with a call to netlbl_secattr_init() before reuse. 30611a03f78SPaul Moore * 30711a03f78SPaul Moore */ 308ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_destroy(struct netlbl_lsm_secattr *secattr) 30911a03f78SPaul Moore { 31011a03f78SPaul Moore kfree(secattr->domain); 31116efd454SPaul Moore if (secattr->flags & NETLBL_SECATTR_CACHE) 31216efd454SPaul Moore netlbl_secattr_cache_free(secattr->cache); 31316efd454SPaul Moore if (secattr->flags & NETLBL_SECATTR_MLS_CAT) 31416efd454SPaul Moore netlbl_secattr_catmap_free(secattr->attr.mls.cat); 31511a03f78SPaul Moore } 31611a03f78SPaul Moore 31711a03f78SPaul Moore /** 31811a03f78SPaul Moore * netlbl_secattr_alloc - Allocate and initialize a netlbl_lsm_secattr struct 31911a03f78SPaul Moore * @flags: the memory allocation flags 32011a03f78SPaul Moore * 32111a03f78SPaul Moore * Description: 32211a03f78SPaul Moore * Allocate and initialize a netlbl_lsm_secattr struct. Returns a valid 32311a03f78SPaul Moore * pointer on success, or NULL on failure. 32411a03f78SPaul Moore * 32511a03f78SPaul Moore */ 3261f758d93SPaul Moore static inline struct netlbl_lsm_secattr *netlbl_secattr_alloc(gfp_t flags) 32711a03f78SPaul Moore { 32811a03f78SPaul Moore return kzalloc(sizeof(struct netlbl_lsm_secattr), flags); 32911a03f78SPaul Moore } 33011a03f78SPaul Moore 33111a03f78SPaul Moore /** 33211a03f78SPaul Moore * netlbl_secattr_free - Frees a netlbl_lsm_secattr struct 33311a03f78SPaul Moore * @secattr: the struct to free 33411a03f78SPaul Moore * 33511a03f78SPaul Moore * Description: 336ffb733c6Spaul.moore@hp.com * Frees @secattr including all of the internal buffers. 33711a03f78SPaul Moore * 33811a03f78SPaul Moore */ 339ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_free(struct netlbl_lsm_secattr *secattr) 34011a03f78SPaul Moore { 341ffb733c6Spaul.moore@hp.com netlbl_secattr_destroy(secattr); 34211a03f78SPaul Moore kfree(secattr); 34311a03f78SPaul Moore } 34411a03f78SPaul Moore 34502752760SPaul Moore #ifdef CONFIG_NETLABEL 34623bcdc1aSPaul Moore /* 34723bcdc1aSPaul Moore * LSM security attribute operations 34823bcdc1aSPaul Moore */ 34902752760SPaul Moore int netlbl_secattr_catmap_walk(struct netlbl_lsm_secattr_catmap *catmap, 35002752760SPaul Moore u32 offset); 35102752760SPaul Moore int netlbl_secattr_catmap_walk_rng(struct netlbl_lsm_secattr_catmap *catmap, 35202752760SPaul Moore u32 offset); 35302752760SPaul Moore int netlbl_secattr_catmap_setbit(struct netlbl_lsm_secattr_catmap *catmap, 35402752760SPaul Moore u32 bit, 35502752760SPaul Moore gfp_t flags); 35602752760SPaul Moore int netlbl_secattr_catmap_setrng(struct netlbl_lsm_secattr_catmap *catmap, 35702752760SPaul Moore u32 start, 35802752760SPaul Moore u32 end, 35902752760SPaul Moore gfp_t flags); 36023bcdc1aSPaul Moore 36123bcdc1aSPaul Moore /* 36216efd454SPaul Moore * LSM protocol operations (NetLabel LSM/kernel API) 36323bcdc1aSPaul Moore */ 36423bcdc1aSPaul Moore int netlbl_enabled(void); 36523bcdc1aSPaul Moore int netlbl_sock_setattr(struct sock *sk, 36623bcdc1aSPaul Moore const struct netlbl_lsm_secattr *secattr); 36723bcdc1aSPaul Moore int netlbl_sock_getattr(struct sock *sk, 36823bcdc1aSPaul Moore struct netlbl_lsm_secattr *secattr); 36923bcdc1aSPaul Moore int netlbl_skbuff_getattr(const struct sk_buff *skb, 37075e22910SPaul Moore u16 family, 37123bcdc1aSPaul Moore struct netlbl_lsm_secattr *secattr); 37223bcdc1aSPaul Moore void netlbl_skbuff_err(struct sk_buff *skb, int error); 37323bcdc1aSPaul Moore 37423bcdc1aSPaul Moore /* 37523bcdc1aSPaul Moore * LSM label mapping cache operations 37623bcdc1aSPaul Moore */ 37723bcdc1aSPaul Moore void netlbl_cache_invalidate(void); 37823bcdc1aSPaul Moore int netlbl_cache_add(const struct sk_buff *skb, 37923bcdc1aSPaul Moore const struct netlbl_lsm_secattr *secattr); 38002752760SPaul Moore #else 38102752760SPaul Moore static inline int netlbl_secattr_catmap_walk( 38202752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 38302752760SPaul Moore u32 offset) 38402752760SPaul Moore { 38502752760SPaul Moore return -ENOENT; 38602752760SPaul Moore } 38702752760SPaul Moore static inline int netlbl_secattr_catmap_walk_rng( 38802752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 38902752760SPaul Moore u32 offset) 39002752760SPaul Moore { 39102752760SPaul Moore return -ENOENT; 39202752760SPaul Moore } 39302752760SPaul Moore static inline int netlbl_secattr_catmap_setbit( 39402752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 39502752760SPaul Moore u32 bit, 39602752760SPaul Moore gfp_t flags) 39702752760SPaul Moore { 39802752760SPaul Moore return 0; 39902752760SPaul Moore } 40002752760SPaul Moore static inline int netlbl_secattr_catmap_setrng( 40102752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 40202752760SPaul Moore u32 start, 40302752760SPaul Moore u32 end, 40402752760SPaul Moore gfp_t flags) 40502752760SPaul Moore { 40602752760SPaul Moore return 0; 40702752760SPaul Moore } 40823bcdc1aSPaul Moore static inline int netlbl_enabled(void) 40923bcdc1aSPaul Moore { 41023bcdc1aSPaul Moore return 0; 41123bcdc1aSPaul Moore } 412ba6ff9f2SPaul Moore static inline int netlbl_sock_setattr(struct sock *sk, 41311a03f78SPaul Moore const struct netlbl_lsm_secattr *secattr) 41411a03f78SPaul Moore { 41511a03f78SPaul Moore return -ENOSYS; 41611a03f78SPaul Moore } 41714a72f53SPaul Moore static inline int netlbl_sock_getattr(struct sock *sk, 41814a72f53SPaul Moore struct netlbl_lsm_secattr *secattr) 41914a72f53SPaul Moore { 42014a72f53SPaul Moore return -ENOSYS; 42114a72f53SPaul Moore } 42211a03f78SPaul Moore static inline int netlbl_skbuff_getattr(const struct sk_buff *skb, 42375e22910SPaul Moore u16 family, 42411a03f78SPaul Moore struct netlbl_lsm_secattr *secattr) 42511a03f78SPaul Moore { 42611a03f78SPaul Moore return -ENOSYS; 42711a03f78SPaul Moore } 42811a03f78SPaul Moore static inline void netlbl_skbuff_err(struct sk_buff *skb, int error) 42911a03f78SPaul Moore { 43011a03f78SPaul Moore return; 43111a03f78SPaul Moore } 43211a03f78SPaul Moore static inline void netlbl_cache_invalidate(void) 43311a03f78SPaul Moore { 43411a03f78SPaul Moore return; 43511a03f78SPaul Moore } 43611a03f78SPaul Moore static inline int netlbl_cache_add(const struct sk_buff *skb, 43711a03f78SPaul Moore const struct netlbl_lsm_secattr *secattr) 43811a03f78SPaul Moore { 43911a03f78SPaul Moore return 0; 44011a03f78SPaul Moore } 44111a03f78SPaul Moore #endif /* CONFIG_NETLABEL */ 44211a03f78SPaul Moore 44311a03f78SPaul Moore #endif /* _NETLABEL_H */ 444