Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | /* * SELinux services exported to the rest of the kernel. * * Author: James Morris <jmorris@redhat.com> * * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2, * as published by the Free Software Foundation. */ #include <linux/types.h> #include <linux/kernel.h> #include <linux/module.h> #include <linux/selinux.h> #include <linux/fs.h> #include <linux/ipc.h> #include <asm/atomic.h> #include "security.h" #include "objsec.h" /* SECMARK reference count */ extern atomic_t selinux_secmark_refcount; int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen) { if (selinux_enabled) return security_sid_to_context(sid, ctx, ctxlen); else { *ctx = NULL; *ctxlen = 0; } return 0; } void selinux_get_inode_sid(const struct inode *inode, u32 *sid) { if (selinux_enabled) { struct inode_security_struct *isec = inode->i_security; *sid = isec->sid; return; } *sid = 0; } void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) { if (selinux_enabled) { struct ipc_security_struct *isec = ipcp->security; *sid = isec->sid; return; } *sid = 0; } void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) { if (selinux_enabled) { struct task_security_struct *tsec = tsk->security; *sid = tsec->sid; return; } *sid = 0; } int selinux_string_to_sid(char *str, u32 *sid) { if (selinux_enabled) return security_context_to_sid(str, strlen(str), sid); else { *sid = 0; return 0; } } EXPORT_SYMBOL_GPL(selinux_string_to_sid); int selinux_secmark_relabel_packet_permission(u32 sid) { if (selinux_enabled) { struct task_security_struct *tsec = current->security; return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET, PACKET__RELABELTO, NULL); } return 0; } EXPORT_SYMBOL_GPL(selinux_secmark_relabel_packet_permission); void selinux_secmark_refcount_inc(void) { atomic_inc(&selinux_secmark_refcount); } EXPORT_SYMBOL_GPL(selinux_secmark_refcount_inc); void selinux_secmark_refcount_dec(void) { atomic_dec(&selinux_secmark_refcount); } EXPORT_SYMBOL_GPL(selinux_secmark_refcount_dec); |