123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687 |
- /*
- * SELinux services exported to the rest of the kernel.
- *
- * Author: James Morris <jmorris@redhat.com>
- *
- * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
- * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
- * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2,
- * as published by the Free Software Foundation.
- */
- #include <linux/types.h>
- #include <linux/kernel.h>
- #include <linux/module.h>
- #include <linux/selinux.h>
- #include <linux/fs.h>
- #include <linux/ipc.h>
- #include "security.h"
- #include "objsec.h"
- int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
- {
- if (selinux_enabled)
- return security_sid_to_context(sid, ctx, ctxlen);
- else {
- *ctx = NULL;
- *ctxlen = 0;
- }
- return 0;
- }
- void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
- {
- if (selinux_enabled) {
- struct inode_security_struct *isec = inode->i_security;
- *sid = isec->sid;
- return;
- }
- *sid = 0;
- }
- void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
- {
- if (selinux_enabled) {
- struct ipc_security_struct *isec = ipcp->security;
- *sid = isec->sid;
- return;
- }
- *sid = 0;
- }
- void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
- {
- if (selinux_enabled) {
- struct task_security_struct *tsec = tsk->security;
- *sid = tsec->sid;
- return;
- }
- *sid = 0;
- }
- int selinux_string_to_sid(char *str, u32 *sid)
- {
- if (selinux_enabled)
- return security_context_to_sid(str, strlen(str), sid);
- else {
- *sid = 0;
- return 0;
- }
- }
- EXPORT_SYMBOL_GPL(selinux_string_to_sid);
- int selinux_relabel_packet_permission(u32 sid)
- {
- if (selinux_enabled) {
- struct task_security_struct *tsec = current->security;
- return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
- PACKET__RELABELTO, NULL);
- }
- return 0;
- }
- EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);
|