exports.c 1.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. /*
  2. * SELinux services exported to the rest of the kernel.
  3. *
  4. * Author: James Morris <jmorris@redhat.com>
  5. *
  6. * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
  7. * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
  8. * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2,
  12. * as published by the Free Software Foundation.
  13. */
  14. #include <linux/types.h>
  15. #include <linux/kernel.h>
  16. #include <linux/module.h>
  17. #include <linux/selinux.h>
  18. #include <linux/fs.h>
  19. #include <linux/ipc.h>
  20. #include "security.h"
  21. #include "objsec.h"
  22. int selinux_sid_to_string(u32 sid, char **ctx, u32 *ctxlen)
  23. {
  24. if (selinux_enabled)
  25. return security_sid_to_context(sid, ctx, ctxlen);
  26. else {
  27. *ctx = NULL;
  28. *ctxlen = 0;
  29. }
  30. return 0;
  31. }
  32. void selinux_get_inode_sid(const struct inode *inode, u32 *sid)
  33. {
  34. if (selinux_enabled) {
  35. struct inode_security_struct *isec = inode->i_security;
  36. *sid = isec->sid;
  37. return;
  38. }
  39. *sid = 0;
  40. }
  41. void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid)
  42. {
  43. if (selinux_enabled) {
  44. struct ipc_security_struct *isec = ipcp->security;
  45. *sid = isec->sid;
  46. return;
  47. }
  48. *sid = 0;
  49. }
  50. void selinux_get_task_sid(struct task_struct *tsk, u32 *sid)
  51. {
  52. if (selinux_enabled) {
  53. struct task_security_struct *tsec = tsk->security;
  54. *sid = tsec->sid;
  55. return;
  56. }
  57. *sid = 0;
  58. }
  59. int selinux_string_to_sid(char *str, u32 *sid)
  60. {
  61. if (selinux_enabled)
  62. return security_context_to_sid(str, strlen(str), sid);
  63. else {
  64. *sid = 0;
  65. return 0;
  66. }
  67. }
  68. EXPORT_SYMBOL_GPL(selinux_string_to_sid);
  69. int selinux_relabel_packet_permission(u32 sid)
  70. {
  71. if (selinux_enabled) {
  72. struct task_security_struct *tsec = current->security;
  73. return avc_has_perm(tsec->sid, sid, SECCLASS_PACKET,
  74. PACKET__RELABELTO, NULL);
  75. }
  76. return 0;
  77. }
  78. EXPORT_SYMBOL_GPL(selinux_relabel_packet_permission);